Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns. [PDF]
Hu S, Zhang Y, Guo Y, Chen Y, Chen L.
europepmc +1 more source
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids. [PDF]
Zhang L, Tang S, Luo H.
europepmc +1 more source
Electron Density Structure Measurements With Scattered Intense Laser Beam
ABSTRACT Short‐pulse intense lasers have the potential to model extreme astrophysical environments in laboratories. Although there are diagnostics for energetic electrons and ions resulting from laser‐plasma interactions, the diagnostics to measure velocity distribution functions at the interaction region of the laser and plasma are limited.
K. Sakai +25 more
wiley +1 more source
Enhanced lion swarm optimization and elliptic curve cryptography scheme for secure cluster head selection and malware detection in IoT-WSN. [PDF]
D USR, R S, A B, D M, Pellakuri V.
europepmc +1 more source
Expander graphs based on GRH with an application to elliptic curve cryptography
David Jao +2 more
openalex +1 more source
Particle rounding effects comparison of different methods: (a), (b), and (c) are the rounding results using the B‐spline curve method with different R; (d), (e), and (f) are the results of vertex rounding substitution method with different rounding radii.
Jiabin Dong +6 more
wiley +1 more source
The use of elliptic curves in cryptography
The use of elliptic curves in cryptography was suggested independently by Neal Koblitz and Victor Miller in 1985. Being a relatively new field, there is still a lot of ongoing research on the subject, but elliptic curve cryptography, or ECC for short, has already been implemented in real-life applications.
openaire +1 more source
The rock failure mode is significantly influenced by the contributing factors, such as the joint inclination, the initial confining pressure, and the unloading point. We found six typical rock failure modes after a large number of numerical tests. Abstract Excavation unloading damages rock masses, with preferential failure along geological defects in ...
Fei Liu +4 more
wiley +1 more source
Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography. [PDF]
Ma R, Du L.
europepmc +1 more source
Securing MMS with High Performance Elliptic Curve Cryptography
Balaso Jagdale +2 more
openalex +1 more source

