Results 111 to 120 of about 7,729 (216)
Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj +1 more source
Data transmission using secure hybrid techniques for smart energy metering devices
Data transfer between components, continuous device monitoring, and other features are possible with an IoT-based energy management system. Due to its lightweight, compact, and expandable characteristics, the Message Queuing Telemetry Transport protocol (
Gudapati Ramyasri+3 more
doaj
Residue Number System Hardware Emulator and Instructions Generator [PDF]
Residue Number System (RNS) is an alternative form of representing integers on which a large value gets represented by a set of smaller and independent integers.
Araújo, Juvenal+2 more
core
Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core
Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS) [PDF]
Simon Blake-Wilson⋆⋆+2 more
openalex +1 more source
Session Initiation Protocol Attacks and Challenges
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan+2 more
core
A Comparison of the Standardized Versions of ECIES [PDF]
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor+3 more
core
SECURE FILE STORAGE ON CLOUD USING ELLIPTIC CURVE CRYPTOGRAPHY (ECC) ALGORITHM
Vedita Santosh Mhatre+2 more
openalex +1 more source