Results 111 to 120 of about 8,381 (240)

USING MODIFIED STERN SERIES FOR DIGITAL SIGNATURE AUTHENTICATION IN ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yesICTACT Journal on Communication Technology, 2011
This paper presents the generation of digital signature along with message recovery based on Elliptic Curve Cryptography (ECC) and knapsack algorithm.
Latha Parthiban, Nivetha Shree
doaj  

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

open access: yesIEEE Access
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj   +1 more source

User Confidentiality Protection in Cloud Computing Using Enhanced Elliptic Curve Cryptography (ECC) Algorithm

open access: yesInternational Journal of Advanced Research in Computer Science and Software Engineering, 2017
Abstract— a lot of customers are concerned about their weakness to attack if their critical IT resources are beyond the firewall. The tremendously scalable nature of cloud computing allows users to access vast amounts of data and use computing resources distributed across different interfaces.
openaire   +1 more source

A survey of hardware implementations of elliptic curve cryptographic systems

open access: yes
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to ...
Halak, Basel   +2 more
core  

87th Annual Meeting of the Meteoritical Society 2025: Abstracts

open access: yes
Meteoritics &Planetary Science, Volume 60, Issue S1, Page 30-350, August 2025.
wiley   +1 more source

Publication Only

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

An Implementation of Digital Signature and Key Agreement on IEEE802.15.4 WSN Embedded Device [PDF]

open access: yes
A wireless sensor network (WSN) now becomes popular in context awareness development to distribute critical information and provide knowledge services to everyone at anytime and anywhere.
Amang, Sudarsono, Mike , Yuliana
core  

Home - About - Disclaimer - Privacy