-
1
A network security protection scheme for tax system based on elliptic curve cryptography
Published 2024-12-01Subjects: Get full text
Article -
2
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01Subjects: Get full text
Article -
3
A Compact 3-Stage Pipelined Hardware Accelerator for Point Multiplication of Binary Elliptic Curves Over GF(2<sup>233</sup>)
Published 2024-01-01Subjects: “…Elliptic curve cryptography…”
Get full text
Article -
4
An Integrated Image Encryption Scheme Based on Elliptic Curve
Published 2023-01-01Subjects: Get full text
Article -
5
Digital Content Security by Butterfly and Elliptic Curve Cryptography with Channel Optimization
Published 2025-02-01Subjects: “…elliptic curve cryptography…”
Get full text
Article -
6
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01Subjects: Get full text
Article -
7
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01Subjects: Get full text
Article -
8
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System
Published 2023-12-01Subjects: Get full text
Article -
9
Realization of smart home key management mechanism based on ECC
Published 2017-06-01Subjects: Get full text
Article -
10
Privacy protection of warning message publishing protocol in VANET
Published 2021-08-01Subjects: Get full text
Article -
11
Research and design of parallel architecture processor for elliptic curve cryptography
Published 2011-01-01Subjects: “…elliptic curve cryptography…”
Get full text
Article -
12
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01Subjects: “…Elliptic curve cryptography…”
Get full text
Article -
13
Research and simulation of timing attacks on ECC
Published 2016-04-01Subjects: Get full text
Article -
14
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
Published 2016-06-01Subjects: Get full text
Article -
15
Efficient pairing-free CP-ABE based on ordered binary decision diagram
Published 2019-12-01Subjects: Get full text
Article -
16
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Published 2025-01-01Subjects: Get full text
Article -
17
Design of Secure and Efficient Framework for Vehicular Digital Twin Networks Using ECC
Published 2024-01-01Subjects: Get full text
Article -
18
SGAK: A Robust ECC-Based Authenticated Key Exchange Protocol for Smart Grid Networks
Published 2024-01-01Subjects: Get full text
Article -
19
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article -
20
A three-factor mutual authentication scheme for telecare medical information system based on ECC
Published 2024-01-01Subjects: Get full text
Article