Works matching DE "ELLIPTIC curve cryptography"
Results: 859
An effective and secure video watermarking using hybrid technique.
- Published in:
- Multimedia Systems, 2021, v. 27, n. 5, p. 953, doi. 10.1007/s00530-021-00765-x
- By:
- Publication type:
- Article
ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment.
- Published in:
- Wireless Personal Communications, 2019, v. 108, n. 2, p. 1021, doi. 10.1007/s11277-019-06450-7
- By:
- Publication type:
- Article
An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment.
- Published in:
- Wireless Personal Communications, 2019, v. 107, n. 1, p. 351, doi. 10.1007/s11277-019-06280-7
- By:
- Publication type:
- Article
SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 1, p. 17, doi. 10.1007/s11277-018-6101-y
- By:
- Publication type:
- Article
A Lightweight Cryptography Technique with Random Pattern Generation.
- Published in:
- Wireless Personal Communications, 2019, v. 104, n. 4, p. 1409, doi. 10.1007/s11277-018-6092-8
- By:
- Publication type:
- Article
Advanced Secured Routing Algorithm of Vehicular Ad-Hoc Network.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 1, p. 41, doi. 10.1007/s11277-018-5824-0
- By:
- Publication type:
- Article
A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 3, p. 1445, doi. 10.1007/s11277-018-5771-9
- By:
- Publication type:
- Article
A Method of Generating 8 × 8 Substitution Boxes Based on Elliptic Curves.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 1, p. 439, doi. 10.1007/s11277-018-5698-1
- By:
- Publication type:
- Article
Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 6131, doi. 10.1007/s11277-017-4830-y
- By:
- Publication type:
- Article
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5253, doi. 10.1007/s11277-016-3739-1
- By:
- Publication type:
- Article
An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5355, doi. 10.1007/s11277-016-3745-3
- By:
- Publication type:
- Article
Privacy-Preserving Mutual Authentication in RFID with Designated Readers.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 4819, doi. 10.1007/s11277-017-4430-x
- By:
- Publication type:
- Article
A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 2, p. 2821, doi. 10.1007/s11277-017-4326-9
- By:
- Publication type:
- Article
Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 2925, doi. 10.1007/s11277-016-3756-0
- By:
- Publication type:
- Article
An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 3371, doi. 10.1007/s11277-016-3781-z
- By:
- Publication type:
- Article
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 2, p. 311, doi. 10.1007/s11277-015-3139-y
- By:
- Publication type:
- Article
Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing.
- Published in:
- Wireless Personal Communications, 2017, v. 92, n. 4, p. 1531, doi. 10.1007/s11277-016-3619-8
- By:
- Publication type:
- Article
Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 3, p. 1331, doi. 10.1007/s11277-016-3393-7
- By:
- Publication type:
- Article
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 879, doi. 10.1007/s11277-015-2815-2
- By:
- Publication type:
- Article
An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 1399, doi. 10.1007/s11277-015-2847-7
- By:
- Publication type:
- Article
An Efficient Hybrid Cryptographic Algorithm, Consuming Less Time for Exchanging Information in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 2, p. 449, doi. 10.1007/s11277-015-2748-9
- By:
- Publication type:
- Article
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 4, p. 2727, doi. 10.1007/s11277-015-2375-5
- By:
- Publication type:
- Article
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 1489, doi. 10.1007/s11277-013-1594-x
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 2, p. 229, doi. 10.1007/s11277-013-1282-x
- By:
- Publication type:
- Article
Secure Transmission of Mobile Agent in Dynamic Distributed Environments.
- Published in:
- Wireless Personal Communications, 2013, v. 70, n. 2, p. 641, doi. 10.1007/s11277-012-0712-5
- By:
- Publication type:
- Article
Ensuring Information Security in Smart Door Lock Systems Using the Cuckoo Search Algorithm.
- Published in:
- Journal of Cybersecurity (2579-0072), 2022, v. 4, n. 4, p. 269, doi. 10.32604/jcs.2023.041707
- By:
- Publication type:
- Article
Cloud-based Secure TeleMedicine Information System using Crypto-Biometric Techniques.
- Published in:
- EAI Endorsed Transactions on Pervasive Health & Technology, 2019, v. 5, n. 20, p. 1, doi. 10.4108/eai.13-7-2018.163837
- By:
- Publication type:
- Article
Biometric based Multi-Authority Inner Product Encryption for Electronic Health Record.
- Published in:
- EAI Endorsed Transactions on Pervasive Health & Technology, 2019, v. 5, n. 20, p. 1, doi. 10.4108/eai.13-7-2018.163135
- By:
- Publication type:
- Article
A Survey on Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3633
- By:
- Publication type:
- Article
Study on Image Encryption Methods using Various Algorithms and Chaotic Map.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2107
- By:
- Publication type:
- Article
Data Security Architecture in Cloud Computing based on Elliptic Curve Cryptography with Special Focus on Lowering the Cipher Space.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 417
- By:
- Publication type:
- Article
Lightweight Cryptographic Key Communication Technique in Wireless Network based on Hyperelliptic Cryptosystem (HECC).
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2021, v. 7, n. 2, p. 99
- By:
- Publication type:
- Article
Improved Scheme of ECC and as Intrusion Detector.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2017, v. 3, n. 3, p. 231
- By:
- Publication type:
- Article
Security in Medical Image Management Using Ant Colony Optimization.
- Published in:
- Information Technology & Control, 2023, v. 52, n. 2, p. 276, doi. 10.5755/j01.itc.52.2.32532
- By:
- Publication type:
- Article
A Simple Off-line E-Cash System with Observers.
- Published in:
- Information Technology & Control, 2018, v. 47, n. 1, p. 107, doi. 10.5755/j01.itc.47.1.18021
- By:
- Publication type:
- Article
Low-Latency Elliptic Curve Scalar Multiplication.
- Published in:
- International Journal of Parallel Programming, 2012, v. 40, n. 5, p. 532, doi. 10.1007/s10766-012-0198-5
- By:
- Publication type:
- Article
Editorial "Blockchain Technology—A Breakthrough Innovation for Modern Industries".
- Published in:
- 2024
- By:
- Publication type:
- Editorial
Area–Time-Efficient High-Radix Modular Inversion Algorithm and Hardware Implementation for ECC over Prime Fields.
- Published in:
- Computers (2073-431X), 2024, v. 13, n. 10, p. 265, doi. 10.3390/computers13100265
- By:
- Publication type:
- Article
Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks.
- Published in:
- Computers (2073-431X), 2023, v. 12, n. 9, p. 171, doi. 10.3390/computers12090171
- By:
- Publication type:
- Article
SPECIFICS OF IMPLEMENTATION OF THE ASYMMETRIC ENCRYPTION ALGORITHM ON ELLIPTIC CURVES.
- Published in:
- Automation of Technological & Business Processes / Avtomatizaciâ Tehnologiceskih i Biznes-Processov, 2023, v. 15, n. 1, p. 1, doi. 10.15673/atbp.v15i1.2484
- By:
- Publication type:
- Article
Secure Communication through MultiAgent System-Based Diabetes Diagnosing and Classification.
- Published in:
- Journal of Intelligent Systems, 2020, v. 29, n. 1, p. 703, doi. 10.1515/jisys-2017-0353
- By:
- Publication type:
- Article
A Chaotic Map-based Approach to Reduce Black Hole Attacks and Authentication Computational Time in MANETs.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 3, p. 13909, doi. 10.48084/etasr.7073
- By:
- Publication type:
- Article
An Innovative Approach to Cardiovascular Disease Prediction: A Hybrid Deep Learning Model.
- Published in:
- Engineering, Technology & Applied Science Research, 2023, v. 13, n. 6, p. 12396, doi. 10.48084/etasr.6503
- By:
- Publication type:
- Article
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments.
- Published in:
- Journal of Cloud Computing (2192-113X), 2023, p. 1, doi. 10.1186/s13677-023-00499-3
- By:
- Publication type:
- Article
Design of elliptic curve cryptoprocessors over GF(2<sup>163</sup>) using the Gaussian normal basis.
- Published in:
- Revista Ingeniería e Investigación, 2014, v. 34, n. 2, p. 55, doi. 10.15446/ing.investig.v34n2.40542
- By:
- Publication type:
- Article
Completing the Complete ECC Formulae with Countermeasures.
- Published in:
- Journal of Low Power Electronics & Applications, 2017, v. 7, n. 1, p. 3, doi. 10.3390/jlpea7010003
- By:
- Publication type:
- Article
Towards Secure Internet of Things-Enabled Healthcare: Integrating Elliptic Curve Digital Signatures and Rivest Cipher Encryption.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 8, p. 581, doi. 10.14569/ijacsa.2024.0150858
- By:
- Publication type:
- Article
Comparing AI Algorithms for Optimizing Elliptic Curve Cryptography Parameters in e-Commerce Integrations: A Pre-Quantum Analysis.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 1539, doi. 10.14569/ijacsa.2024.01506153
- By:
- Publication type:
- Article
Hybrid Algorithm using Rivest-Shamir-Adleman and Elliptic Curve Cryptography for Secure Email Communication.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 1037, doi. 10.14569/ijacsa.2024.01504105
- By:
- Publication type:
- Article
A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment.
- Published in:
- Future Internet, 2024, v. 16, n. 10, p. 357, doi. 10.3390/fi16100357
- By:
- Publication type:
- Article