Works matching DE "ELLIPTIC curve cryptography"
Results: 853
End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 3223, doi. 10.32604/cmc.2024.054676
- By:
- Publication type:
- Article
PIA-A secure and efficient identity authentication scheme in telemedicine via the PUF method.
- Published in:
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-025-89502-2
- By:
- Publication type:
- Article
Experimental Study on FRP-Reinforced PP ECC Beams Under Reverse Cyclic Loading.
- Published in:
- Mechanics of Composite Materials, 2014, v. 50, n. 4, p. 447, doi. 10.1007/s11029-014-9431-1
- By:
- Publication type:
- Article
A secure data hiding system in biomedical images using grain 128a algorithm, logistic mapping and elliptical curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2025, v. 84, n. 4, p. 2005, doi. 10.1007/s11042-024-19147-2
- By:
- Publication type:
- Article
A privacy-preserving deep learning framework for highly authenticated blockchain secure storage system.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 36, p. 84299, doi. 10.1007/s11042-024-19150-7
- By:
- Publication type:
- Article
Privacy-preserving cloud-based secure digital locker with differential privacy-based deep learning technique.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 34, p. 81299, doi. 10.1007/s11042-024-18566-5
- By:
- Publication type:
- Article
Digital image copyright protection method based on blockchain and zero trust mechanism.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 32, p. 77267, doi. 10.1007/s11042-024-18514-3
- By:
- Publication type:
- Article
ECC based novel color image encryption methodology using primitive polynomial.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 31, p. 76301, doi. 10.1007/s11042-024-18245-5
- By:
- Publication type:
- Article
Proposal of a lightweight differential power analysis countermeasure method on elliptic curves for low-cost devices.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 30, p. 74657, doi. 10.1007/s11042-024-18368-9
- By:
- Publication type:
- Article
Energy efficient routing and secured data transmission in the IoV: Improved deep learning model for energy prediction.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 30, p. 74441, doi. 10.1007/s11042-024-18172-5
- By:
- Publication type:
- Article
Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 29, p. 72301, doi. 10.1007/s11042-024-18363-0
- By:
- Publication type:
- Article
Construction of S-boxes from cyclic group of residue class of noncommutative quaternion integers.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 24, p. 64717, doi. 10.1007/s11042-023-17906-1
- By:
- Publication type:
- Article
Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 16, p. 47269, doi. 10.1007/s11042-023-17365-8
- By:
- Publication type:
- Article
An efficient framework for authentication and blockchain authorization of secured healthcare information using hpcsg- rotdf-slorb and dhsk-decc.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 15, p. 45471, doi. 10.1007/s11042-023-17362-x
- By:
- Publication type:
- Article
Content addressable memory (CAM) based robust anonymous authentication and integrity preservation scheme for wireless body area networks (WBAN).
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 7, p. 20429, doi. 10.1007/s11042-023-16257-1
- By:
- Publication type:
- Article
A novel approach for designing secure substitution boxes based on Catalan number and elliptic curve.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 10409, doi. 10.1007/s11042-023-15971-0
- By:
- Publication type:
- Article
Smart healthcare system using integrated and lightweight ECC with private blockchain for multimedia medical data processing.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 28, p. 44335, doi. 10.1007/s11042-023-15204-4
- By:
- Publication type:
- Article
Retraction Note: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
High capacity reversible data hiding in encrypted images using multi-MSB data hiding mechanism with elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 18, p. 28087, doi. 10.1007/s11042-023-14683-9
- By:
- Publication type:
- Article
WoM-based deep BiLSTM: smart disease prediction model using WoM-based deep BiLSTM classifier.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 16, p. 25061, doi. 10.1007/s11042-023-14336-x
- By:
- Publication type:
- Article
A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 15, p. 22525, doi. 10.1007/s11042-022-14140-z
- By:
- Publication type:
- Article
Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 14, p. 21131, doi. 10.1007/s11042-023-14539-2
- By:
- Publication type:
- Article
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 11, p. 16009, doi. 10.1007/s11042-022-14007-3
- By:
- Publication type:
- Article
Improvement of image transmission using chaotic system and elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 1, p. 1149, doi. 10.1007/s11042-022-13253-9
- By:
- Publication type:
- Article
Multi-level image security using elliptic curve and magic matrix with advanced encryption standard.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 26, p. 37783, doi. 10.1007/s11042-022-12993-y
- By:
- Publication type:
- Article
QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 25, p. 36781, doi. 10.1007/s11042-022-13502-x
- By:
- Publication type:
- Article
An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 24, p. 34969, doi. 10.1007/s11042-021-10523-w
- By:
- Publication type:
- Article
Cloud based secure multimedia medical data using optimized convolutional neural network and cryptography mechanism.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 23, p. 33971, doi. 10.1007/s11042-022-12466-2
- By:
- Publication type:
- Article
Cloud based secure multimedia medical data using optimized convolutional neural network and cryptography mechanism.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 22, p. 33971, doi. 10.1007/s11042-022-12466-2
- By:
- Publication type:
- Article
Mutual authentication framework using fog computing in healthcare.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 22, p. 31977, doi. 10.1007/s11042-022-12131-8
- By:
- Publication type:
- Article
A novel approach for dual layer security of message using Steganography and Cryptography.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 15, p. 20669, doi. 10.1007/s11042-022-12084-y
- By:
- Publication type:
- Article
Misconstrued voice on SC-FDMA for secured comprehension - a cooperative influence of DWT and ECC.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 5, p. 7201, doi. 10.1007/s11042-022-11996-z
- By:
- Publication type:
- Article
Proposed Secret Encoding Method Based Genetic Algorithm for Elliptic Curve Cryptography Method.
- Published in:
- Iraqi Journal of Information Technology, 2018, v. 8, n. 3, Part 1, p. 21
- By:
- Publication type:
- Article
边缘计算与区块多链下的安全可信认证模型.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2023, v. 17, n. 3, p. 733, doi. 10.3778/j.issn.1673-9418.2206011
- By:
- Publication type:
- Article
A Novel Method for Mapping Plaintext Characters to Elliptic Curve Affine points over Prime Field and Pseudorandom Number Generation.
- Published in:
- International Journal of Computer Information Systems & Industrial Management Applications, 2020, v. 12, p. 204
- By:
- Publication type:
- Article
FFT enabled ECC for WSN nodes without hardware multiplier support.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2022, v. 30, n. 1, p. 94, doi. 10.3906/elk-2009-95
- By:
- Publication type:
- Article
Field-programmable gate array (FPGA) hardware design and implementation of a new area efficient elliptic curve crypto-processor.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2021, v. 29, n. 4, p. 2127, doi. 10.3906/elk-2008-8
- By:
- Publication type:
- Article
Empirical Evaluation of ECC Batch Verification Algorithms of Digital Signature in Wireless Sensor Network.
- Published in:
- Electronics / Elektronika (1450-5843), 2022, v. 26, n. 2, p. 53, doi. 10.53314/ELS2226053K
- By:
- Publication type:
- Article
Editor's Column.
- Published in:
- Electronics / Elektronika (1450-5843), 2022, v. 26, n. 2, p. 35, doi. 10.53314/ELS2226035K
- By:
- Publication type:
- Article
Cryptographic Transitions: Historical Considerations.
- Published in:
- ISSA Journal, 2022, v. 20, n. 9, p. 16
- By:
- Publication type:
- Article
Quantum Cryptography: Myths, Legends, and Hypothesis.
- Published in:
- ISSA Journal, 2021, v. 19, n. 1, p. 22
- By:
- Publication type:
- Article
The Web PKI of the Future.
- Published in:
- ISSA Journal, 2019, v. 17, n. 12, p. 33
- By:
- Publication type:
- Article
Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 12, p. 241, doi. 10.3390/technologies12120241
- By:
- Publication type:
- Article
Paving the Way for SQIsign: Toward Efficient Deployment on 32-bit Embedded Devices.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 19, p. 3147, doi. 10.3390/math12193147
- By:
- Publication type:
- Article
A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 15, p. 2383, doi. 10.3390/math12152383
- By:
- Publication type:
- Article
An Optimized Point Multiplication Strategy in Elliptic Curve Cryptography for Resource-Constrained Devices.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 6, p. 881, doi. 10.3390/math12060881
- By:
- Publication type:
- Article
Dynamic S-Box Construction Using Mordell Elliptic Curves over Galois Field and Its Applications in Image Encryption.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 4, p. 587, doi. 10.3390/math12040587
- By:
- Publication type:
- Article
Generalized Fibonacci Sequences for Elliptic Curve Cryptography.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 22, p. 4656, doi. 10.3390/math11224656
- By:
- Publication type:
- Article
A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 18, p. 3857, doi. 10.3390/math11183857
- By:
- Publication type:
- Article
Cross-Server End-to-End Patient Key Agreement Protocol for DNA-Based U-Healthcare in the Internet of Living Things.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 7, p. 1638, doi. 10.3390/math11071638
- By:
- Publication type:
- Article