Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Comparitive study of RSD based and CSD based arithmetic modules of ECC
Sabu, Aparna
Published in ICICCS : 2017 International Conference on Intelligent Computing and Control Systems : 15-16 June 2017 (01.06.2017)
Published in ICICCS : 2017 International Conference on Intelligent Computing and Control Systems : 15-16 June 2017 (01.06.2017)
Get full text
Conference Proceeding
Loading…
Loading…
Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach
Manvi, S.S., Kakkasageri, M.S., Adiga, D.G.
Published in Future Computer and Communications, Proceedings (01.04.2009)
Published in Future Computer and Communications, Proceedings (01.04.2009)
Get full text
Conference Proceeding
Loading…
Loading…
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
Meurice de Dormale, Guerric, Quisquater, Jean-Jacques
Published in Journal of systems architecture (01.02.2007)
Published in Journal of systems architecture (01.02.2007)
Get full text
Journal Article
Loading…
Loading…
A semi-blind HVS based image watermarking scheme using elliptic curve cryptography
Gupta, Ritu, Mishra, Anurag, Jain, Sarika
Published in Multimedia tools and applications (01.08.2018)
Published in Multimedia tools and applications (01.08.2018)
Get full text
Journal Article
Loading…
Loading…
Secure Multi-Hop Assisted IoT Communications in Smart Cities
Awais Javed, Muhammad, Alkhathami, Mohammed, AlMohimeed, Abdulaziz, Almujalli, Abeer
Published in IEEE access (2024)
Published in IEEE access (2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
ECC certificate for authentication in cloud-based RFID
Chaimae, Elmakfalji, Rahal, Romadi, Abdellatif, El Afia
Published in 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech) (01.05.2016)
Published in 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech) (01.05.2016)
Get full text
Conference Proceeding
Loading…
A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Sakharkar, Sneha M., Mangrulkar, R. S., Atique, Mohammad
Published in 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science (01.03.2014)
Published in 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science (01.03.2014)
Get full text
Conference Proceeding
Loading…
Certicom Suite B Power Bundle for nCipher HSMs to deliver complete hardware and software support for Elliptic Curve Cryptography
Published in Canada NewsWire
(09.04.2007)
Get full text
Newsletter
Loading…
Certicom Announces Executive Changes
Published in Canada NewsWire
(02.04.2007)
Get full text
Newsletter
Loading…
At RSA Conference 2007 Industry Experts Discuss the Factors that Make ECC Ready for Prime Time in TLS
Published in Canada NewsWire
(31.01.2007)
Get full text
Newsletter
Loading…
Cybertrust Licenses Certicom Suite B Power Bundle Products to Offer Commercially Available Elliptic Curve Certificates
Published in Canada NewsWire
(30.01.2007)
Get full text
Newsletter