Results 111 to 120 of about 7,729 (216)

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

open access: yesIEEE Access
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj   +1 more source

Data transmission using secure hybrid techniques for smart energy metering devices

open access: yese-Prime: Advances in Electrical Engineering, Electronics and Energy, 2023
Data transfer between components, continuous device monitoring, and other features are possible with an IoT-based energy management system. Due to its lightweight, compact, and expandable characteristics, the Message Queuing Telemetry Transport protocol (
Gudapati Ramyasri   +3 more
doaj  

Residue Number System Hardware Emulator and Instructions Generator [PDF]

open access: yes, 2016
Residue Number System (RNS) is an alternative form of representing integers on which a large value gets represented by a set of smaller and independent integers.
Araújo, Juvenal   +2 more
core  

Publication Only

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]

open access: yes, 2011
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core  

Session Initiation Protocol Attacks and Challenges

open access: yes, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan   +2 more
core  

A Comparison of the Standardized Versions of ECIES [PDF]

open access: yes, 2010
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor   +3 more
core  

2024 SMFM Global Congress Abstracts

open access: yes
Pregnancy, Volume 1, Issue 2, March 2025.
wiley   +1 more source

Home - About - Disclaimer - Privacy