Your search returned 4 results. Subscribe to this search

|
1. Design of a hummingbird crypto asic implementing bist technique

by Azizul Haque, Md.

Publisher: Dhaka Institute of Information and Communication Technology, BUET 2016Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/AZI/2016] (1).

2. Design of a high speed crypto-processor ASIC for next generation IT security

by Roy, Niranjan.

Publisher: Dhaka Institute of Information and Communication Technology, BUET Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82 /ROY/2007] (1).

3. FPGA implementation of fault tollerent reversible contrast mapping technique

by Mahmudul Hasan.

Publisher: Dhaka Institute of Information and Communication Technology (IICT), BUET 2017Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/MAH/2017] (1).

4. Protecting an enterprise network through the deployment of honey pot

by Hasnain Bari.

Publisher: Dhaka Institute of Information and Communication Technology, BUET 2021Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/HAS/2021] (1).