Results 21 to 30 of about 7,729 (216)
Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the form of a Certificate Authority or as an authentication server. The main objective of this research is to present an autonomous solution where users could store their credentials, without depending on TTPs.
Daniel Maldonado-Ruiz+2 more
openalex +5 more sources
ELLIPTIC CURVE CRYPTOGRAPHY (ECC) PADA PROSES PERTUKARAN KUNCI PUBLIK DIFFIE-HELMAN
Elliptic Curve Cryptography (ECC) pada Proses Pertukaran Kunci Publik Diffie-Hellman. Dalam tugas akhir ini dibahas mengenai algoritma kriptografi kurva elliptik untuk enkripsi dan dekripsi data. Metode yang digunakan adalah dengan menggunakan kunci publik Diffie-Hellman.
M Sembiring
openalex +3 more sources
Elliptic Curve Cryptography (ECC) based Relational Database Watermarking
Manoj Kumar+2 more
openalex +3 more sources
Abstract— a lot of customers are concerned about their weakness to attack if their critical IT resources are beyond the firewall. The tremendously scalable nature of cloud computing allows users to access vast amounts of data and use computing resources distributed across different interfaces.
Abdu Osman
openalex +4 more sources
ANALISIS KRIPTO SISTEM ALGORITMA AES DAN ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK KEAMANAN DATA
Kriptografi merupakan salah satu solusi atau metode pengamanan data yang tepat untuk menjaga kerahasiaan dan keaslian data, serta dapat meningkatkan aspek keamanan suatu data atau informasi. Metode ini bertujuan agar informasi yang bersifat rahasia dan dikirim melalui suatu jaringan, seperti LAN atau Internet, tidak dapat diketahui atau dimanfaatkan ...
Edy Budi Harjono Sibarani+2 more
openalex +3 more sources
Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) [PDF]
Simon Blake-Wilson⋆⋆+4 more
openalex +2 more sources
Enhancing Data Encryption using Elliptic Curve Cryptography (ECC) Algorithm in 4G Networks [PDF]
Abdu Osman
openalex +2 more sources
AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS [PDF]
D. McGrew+3 more
openalex +2 more sources
Wireless Body Area Networks (WBANs) has been recognized as one of the promising wireless sensor technologies for improving healthcare service thanks to its capability of seamlessly and continuously exchanging medical information in real time. However, the lack of a clear in-depth defense line in such a new networking paradigm would make it potential ...
Young Sil Lee+2 more
openalex +2 more sources
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements.
Israa M. Al-dulaimi, Ayman Khalil
openalex +6 more sources