-
21
Robust Distributed Reprogramming Protocol of Wireless Sensor Networks for Healthcare Systems
Published 2015-11-01“…In this paper, we propose a robust distributed reprogramming protocol of WSNs for healthcare systems, in which the security requirements are proved to be secure based on the elliptic curve discrete logarithm problem, such as existential unforgeability of signature for code image, authenticity of code image, freshness, and node compromised tolerance.…”
Get full text
Article -
22
Topological Indices of Total Graph and Zero Divisor Graph of Commutative Ring: A Polynomial Approach
Published 2023-01-01“…Graphs containing finite commutative rings have wide applications in robotics, information and communication theory, elliptic curve cryptography, physics, and statistics. …”
Get full text
Article -
23
Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization
Published 2024-01-01“…Employing established techniques such as elliptic curve cryptography, Schnorr verifiable random function, and zero-knowledge proof (zk-SNARK), alongside groundbreaking methodologies for stake distribution, anomaly detection, and incentive alignment, our framework sets a new benchmark for secure, scalable, and decentralized blockchain ecosystems. …”
Get full text
Article -
24
A Novel Memcapacitor Model and Its Application for Image Encryption Algorithm
Published 2019-01-01“…Furthermore, the elliptic curve with the hyperchaotic sequence is used to construct the Hill encryption matrix, and the plaintext image is permuted and encrypted. …”
Get full text
Article -
25
An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature
Published 2020-01-01“…In this scheme, it can implement the process of adding, signing, verifying, and revoking group members only by simple multiplication of the elliptic curve and synchronization factor technology, which shortens the length of the signature and improves the efficiency of the signature. …”
Get full text
Article -
26
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. …”
Get full text
Article -
27
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Published 2014-01-01“…In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. …”
Get full text
Article -
28
Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users
Published 2025-01-01“…In order to address these issues, this study proposes an integrated approach combining elliptic curve digital signatures with hash functions for data integrity and authentication, Paillier cryptography for confidentiality, and calibrated noise for privacy preservation. …”
Get full text
Article -
29
EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications
Published 2013-11-01“…In this paper, we propose a group authentication and key agreement protocol, called EG-AKA, for machine-type communications combining elliptic curve Diffie-Hellman (ECDH) based on EAP framework. …”
Get full text
Article -
30
Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs
Published 2016-01-01“…Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. …”
Get full text
Article -
31
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors
Published 2010-10-01“…In order to avoid dependencies on a compromised level of security, a WSN node with a microcontroller and a Field Programmable Gate Array (FPGA) is used along this work to implement a state-of-the art solution based on ECC (Elliptic Curve Cryptography). In this paper it is described how the reconfiguration possibilities of the system can be used to adapt ECC parameters in order to increase or reduce the security level depending on the application scenario or the energy budget. …”
Get full text
Article -
32
Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks
Published 2021-01-01“…In this study, an anonymous authentication and key negotiation scheme by using private key and group key is proposed, which is based on pseudonym using the nonsingular elliptic curve. In this scheme, there is no third party trust center to participate in the authentication, there is no need to query the database, and there is no need of the local database to save the identity information of many vehicles, which reduce the storage space and the authentication time compared with other schemes. …”
Get full text
Article -
33
Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
Published 2012-07-01“…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. …”
Get full text
Article -
34
Intelligent two-phase dual authentication framework for Internet of Medical Things
Published 2025-01-01“…During the registration phase, our framework is based on Elliptic Curve Diffie-Hellman (ECDH) for rapid key exchange, and during real-time communication, our framework uses the Advanced Encryption Standard Galois Counter Mode (AES-GCM) to encrypt data securely. …”
Get full text
Article -
35
A Novel Spectrometer for Measuring Laser-Produced Plasma X-Ray in Inertial Confinement Fusion
Published 2012-01-01“…In order to diagnose laser-plasma distribution in space and evolution in time, an elliptical curved crystal spectrometer has been developed and applied to diagnose X-ray of laser-produced plasma in 0.2~2.46 nm region. …”
Get full text
Article -
36
The number of edges on generalizations of Paley graphs
Published 2001-01-01“…Here we obtain formulae for the number of edges of generalizations of these subgraphs using Gaussian hypergeometric series and elliptic curves. Such formulae are simple in several infinite families, including those studied by Evans, Pulham, and Sheenan.…”
Get full text
Article -
37
The vanishing of anticyclotomic $\mu $-invariants for non-ordinary modular forms
Published 2023-01-01“…This gives an alternative method to reprove a recent result of Matar on the vanishing of the $\mu $-invariants of plus and minus signed Selmer groups for elliptic curves.…”
Get full text
Article -
38
PATS: Let Parties Have a Say in Threshold Group Key Sharing
Published 2024-01-01“…In this paper, we present PATS, which employs finite fields and elliptic curves, along with its security and complexity analyses.…”
Get full text
Article -
39
Geometrically Nonlinear Analysis of Functionally Graded Timoshenko Curved Beams with Variable Curvatures
Published 2019-01-01“…This paper presents some equilibrium paths and configurations of the elliptic curved beam for different pinching concentrated loads.…”
Get full text
Article -
40
Biaxial Shear Load Capacity of Anchor System for Quick-Hardening Track on Railway Bridges
Published 2018-01-01“…The biaxial shear capacity of each design was investigated experimentally, and the structural capacity for biaxial shear loads was evaluated using an elliptical curve to represent the longitudinal and transverse shear capacities. …”
Get full text
Article