Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services. [PDF]
Awasthi C, Awasthi SP, Mishra PK.
europepmc +1 more source
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography. [PDF]
Xu G+6 more
europepmc +1 more source
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [PDF]
Wenbo Shi, Peng Gong
openalex +1 more source
Compared to experimental data of thermophysical properties of NFs, semi‐empirical models cannot estimate FOM correctly. For all working fluids, applying a converging channel instead of the canonical case was inefficient. Diverging channel was always favored compared to the canonical case. For less effective NFs, both lowering the reference velocity and
Mahmoud Jourabian, Mehrdad Raeesi
wiley +1 more source
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns. [PDF]
Hu S, Zhang Y, Guo Y, Chen Y, Chen L.
europepmc +1 more source
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids. [PDF]
Zhang L, Tang S, Luo H.
europepmc +1 more source
Elliptic Curve Cryptography in Securing Networks by Mobile Authentication [PDF]
M. Prabhakar
openalex +1 more source
Error Analysis of a Pressure‐Correction Method With Explicit Time‐Stepping
We study explicit variants of this well‐established pressure‐correction scheme for solving the Navier–Stokes equations. Step 3 is replaced by an explicit time‐integration method. We give the complete error analysis for this scheme that allows for highly efficient implementations.
Utku Kaya, Thomas Richter
wiley +1 more source
Enhanced lion swarm optimization and elliptic curve cryptography scheme for secure cluster head selection and malware detection in IoT-WSN. [PDF]
D USR, R S, A B, D M, Pellakuri V.
europepmc +1 more source
Efficient algorithms for elliptic curve cryptography
Bibliography: p.
openaire +2 more sources