Results 21 to 30 of about 7,729 (216)

3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography

open access: green2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 2020
Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the form of a Certificate Authority or as an authentication server. The main objective of this research is to present an autonomous solution where users could store their credentials, without depending on TTPs.
Daniel Maldonado-Ruiz   +2 more
openalex   +5 more sources

ELLIPTIC CURVE CRYPTOGRAPHY (ECC) PADA PROSES PERTUKARAN KUNCI PUBLIK DIFFIE-HELMAN

open access: hybridVisipena Journal, 2015
Elliptic Curve Cryptography (ECC) pada Proses Pertukaran Kunci Publik Diffie-Hellman. Dalam tugas akhir ini dibahas mengenai algoritma kriptografi kurva elliptik untuk enkripsi dan dekripsi data. Metode yang digunakan adalah dengan menggunakan kunci publik Diffie-Hellman.
M Sembiring
openalex   +3 more sources

Elliptic Curve Cryptography (ECC) based Relational Database Watermarking

open access: bronzeInternational Journal of Computer Applications, 2016
Manoj Kumar   +2 more
openalex   +3 more sources

User Confidentiality Protection in Cloud Computing Using Enhanced Elliptic Curve Cryptography (ECC) Algorithm

open access: bronzeInternational Journal of Advanced Research in Computer Science and Software Engineering, 2017
Abstract— a lot of customers are concerned about their weakness to attack if their critical IT resources are beyond the firewall. The tremendously scalable nature of cloud computing allows users to access vast amounts of data and use computing resources distributed across different interfaces.
Abdu Osman
openalex   +4 more sources

ANALISIS KRIPTO SISTEM ALGORITMA AES DAN ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK KEAMANAN DATA

open access: goldInfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan), 2017
Kriptografi merupakan salah satu solusi atau metode pengamanan data yang tepat untuk menjaga kerahasiaan dan keaslian data, serta dapat meningkatkan aspek keamanan suatu data atau informasi. Metode ini bertujuan agar informasi yang bersifat rahasia dan dikirim melalui suatu jaringan, seperti LAN atau Internet, tidak dapat diketahui atau dimanfaatkan ...
Edy Budi Harjono Sibarani   +2 more
openalex   +3 more sources

Enhancing Data Encryption using Elliptic Curve Cryptography (ECC) Algorithm in 4G Networks [PDF]

open access: bronzeInternational Journal of Advanced Research in Computer Science and Software Engineering, 2017
Abdu Osman
openalex   +2 more sources

An Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System

open access: bronzeInternational Journal of Security and Its Applications, 2014
Wireless Body Area Networks (WBANs) has been recognized as one of the promising wireless sensor technologies for improving healthcare service thanks to its capability of seamlessly and continuously exchanging medical information in real time. However, the lack of a clear in-depth defense line in such a new networking paradigm would make it potential ...
Young Sil Lee   +2 more
openalex   +2 more sources

Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cryptography (ECC) for Vehicular Ad hoc Network (VANET)

open access: goldInternational Journal of Engineering and Management Research, 2020
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements.
Israa M. Al-dulaimi, Ayman Khalil
openalex   +6 more sources

Home - About - Disclaimer - Privacy