Found: 799
Select item for more details and to access through your institution.
Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 87, doi. 10.54216/JCIM.140206
- By:
- Publication type:
- Article
The comparison of several cryptosystems using the elliptic curve: a report.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 5, p. 5319, doi. 10.11591/ijece.v14i5.pp5319-5329
- By:
- Publication type:
- Article
Enhancing Industrial Robot Arms Data Security with a Hybrid Encryption Approach.
- Published in:
- Sakarya University Journal of Science (SAUJS) / Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2024, v. 28, n. 4, p. 756, doi. 10.16984/saufenbilder.1440949
- By:
- Publication type:
- Article
ECAUT: ECC-infused efficient authentication for internet of things systems based on zero-knowledge proof.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 17, p. 25640, doi. 10.1007/s11227-024-06427-9
- By:
- Publication type:
- Article
Digital image copyright protection method based on blockchain and zero trust mechanism.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 32, p. 77267, doi. 10.1007/s11042-024-18514-3
- By:
- Publication type:
- Article
Towards Secure Internet of Things-Enabled Healthcare: Integrating Elliptic Curve Digital Signatures and Rivest Cipher Encryption.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 8, p. 581, doi. 10.14569/ijacsa.2024.0150858
- By:
- Publication type:
- Article
ECC based novel color image encryption methodology using primitive polynomial.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 31, p. 76301, doi. 10.1007/s11042-024-18245-5
- By:
- Publication type:
- Article
Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2024, v. 49, n. 9, p. 12919, doi. 10.1007/s13369-024-08884-z
- By:
- Publication type:
- Article
A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2024, v. 49, n. 9, p. 11991, doi. 10.1007/s13369-023-08535-9
- By:
- Publication type:
- Article
Proposal of a lightweight differential power analysis countermeasure method on elliptic curves for low-cost devices.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 30, p. 74657, doi. 10.1007/s11042-024-18368-9
- By:
- Publication type:
- Article
Energy efficient routing and secured data transmission in the IoV: Improved deep learning model for energy prediction.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 30, p. 74441, doi. 10.1007/s11042-024-18172-5
- By:
- Publication type:
- Article
Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 29, p. 72301, doi. 10.1007/s11042-024-18363-0
- By:
- Publication type:
- Article
Hybrid Encryption Model for Secured Three-Phase Authentication Protocol in IoT.
- Published in:
- Journal of Sensor & Actuator Networks, 2024, v. 13, n. 4, p. 41, doi. 10.3390/jsan13040041
- By:
- Publication type:
- Article
부채널 공격 방어를 위한 혼합 대응기법이 구현된 타원 곡선 암호 프로세서.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2024, v. 28, n. 8, p. 959, doi. 10.6109/jkiice.2024.28.8.959
- By:
- Publication type:
- Article
Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 46, n. 1, p. 2635, doi. 10.32604/csse.2023.031605
- By:
- Publication type:
- Article
Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 45, n. 1, p. 641, doi. 10.32604/csse.2023.028341
- By:
- Publication type:
- Article
Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 41, n. 1, p. 83, doi. 10.32604/csse.2022.020071
- By:
- Publication type:
- Article
Experimental Study on FRP-Reinforced PP ECC Beams Under Reverse Cyclic Loading.
- Published in:
- Mechanics of Composite Materials, 2014, v. 50, n. 4, p. 447, doi. 10.1007/s11029-014-9431-1
- By:
- Publication type:
- Article
Anonymous biometrics-based authentication with key agreement scheme for multi-server environment using ECC.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 19, p. 27553, doi. 10.1007/s11042-019-07812-w
- By:
- Publication type:
- Article
SNAP-compressive lossless sensitive image authentication and protection scheme based on Genus-2 hyper elliptic curve.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 18, p. 26163, doi. 10.1007/s11042-019-7738-6
- By:
- Publication type:
- Article
Robust secure video steganography using reversible patch-wise code-based embedding.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 20, p. 27427, doi. 10.1007/s11042-018-5930-8
- By:
- Publication type:
- Article
New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 18, p. 23335, doi. 10.1007/s11042-018-5683-4
- By:
- Publication type:
- Article
A semi-blind HVS based image watermarking scheme using elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 15, p. 19235, doi. 10.1007/s11042-017-5351-0
- By:
- Publication type:
- Article
Self-Similar key generation for secure communication in multimedia applications.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 8, p. 10329, doi. 10.1007/s11042-018-5688-z
- By:
- Publication type:
- Article
An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 22, p. 24315, doi. 10.1007/s11042-016-4198-0
- By:
- Publication type:
- Article
Design of a password-based authenticated key exchange protocol for SIP.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 23, p. 16017, doi. 10.1007/s11042-015-2911-z
- By:
- Publication type:
- Article
Faster elliptic curve arithmetic for triple-base chain by reordering sequences of field operations.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 22, p. 14819, doi. 10.1007/s11042-016-3272-y
- By:
- Publication type:
- Article
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 8, p. 4485, doi. 10.1007/s11042-015-2487-7
- By:
- Publication type:
- Article
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 1, p. 181, doi. 10.1007/s11042-014-2282-x
- By:
- Publication type:
- Article
A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 10, p. 3477, doi. 10.1007/s11042-014-1885-6
- By:
- Publication type:
- Article
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 5, p. 1711, doi. 10.1007/s11042-014-2283-9
- By:
- Publication type:
- Article
A new image encryption scheme based on cyclic elliptic curve and chaotic system.
- Published in:
- Multimedia Tools & Applications, 2014, v. 70, n. 3, p. 1559, doi. 10.1007/s11042-012-1173-2
- By:
- Publication type:
- Article
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol.
- Published in:
- Multimedia Tools & Applications, 2013, v. 66, n. 2, p. 165, doi. 10.1007/s11042-011-0787-0
- By:
- Publication type:
- Article
Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 15, p. 21592, doi. 10.1007/s11227-024-06270-y
- By:
- Publication type:
- Article
Elliptic curve encryption-based energy-efficient secured ACO routing protocol for wireless sensor networks.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 13, p. 18866, doi. 10.1007/s11227-024-06235-1
- By:
- Publication type:
- Article
Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 2681, doi. 10.1007/s11227-023-05577-6
- By:
- Publication type:
- Article
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 1668, doi. 10.1007/s11227-023-05535-2
- By:
- Publication type:
- Article
E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p).
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 1, p. 50, doi. 10.1007/s11227-023-05428-4
- By:
- Publication type:
- Article
Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 14, p. 16233, doi. 10.1007/s11227-023-05272-6
- By:
- Publication type:
- Article
Secrecy aware key management scheme for Internet of Healthcare Things.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 11, p. 12492, doi. 10.1007/s11227-023-05144-z
- By:
- Publication type:
- Article
A privacy-preserving data transfer in a blockchain-based commercial real estate platform using random address generation mechanism.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 10, p. 10796, doi. 10.1007/s11227-022-04906-5
- By:
- Publication type:
- Article
RKMIS: robust key management protocol for industrial sensor network system.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 9, p. 9837, doi. 10.1007/s11227-022-05041-x
- By:
- Publication type:
- Article
Hybrid cryptographic approach to enhance the mode of key management system in cloud environment.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 7, p. 7377, doi. 10.1007/s11227-022-04964-9
- By:
- Publication type:
- Article
RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 14, p. 16167, doi. 10.1007/s11227-022-04513-4
- By:
- Publication type:
- Article
Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 1, p. 497, doi. 10.1007/s11227-021-03857-7
- By:
- Publication type:
- Article
Secure authenticated key exchange for WSNs in IoT applications.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 12, p. 13897, doi. 10.1007/s11227-021-03836-y
- By:
- Publication type:
- Article
Efficient implementation of modular multiplication over 192-bit NIST prime for 8-bit AVR-based sensor node.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 5, p. 4852, doi. 10.1007/s11227-020-03441-5
- By:
- Publication type:
- Article
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 2, p. 1114, doi. 10.1007/s11227-020-03318-7
- By:
- Publication type:
- Article
A privacy-preserving code-based authentication protocol for Internet of Things.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 12, p. 8231, doi. 10.1007/s11227-019-03003-4
- By:
- Publication type:
- Article
Elliptic Curve Cryptography hardware accelerator for high-performance secure servers.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 3, p. 1107, doi. 10.1007/s11227-018-2317-6
- By:
- Publication type:
- Article