Results 41 to 50 of about 8,381 (240)

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor

open access: yesIEEE Access, 2023
With the rising data evolution, the demand for secured communications over networks is rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill the requirements of modern network applications.
Binh Kieu Do-Nguyen   +4 more
doaj   +1 more source

A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things

open access: yesSensors, 2020
Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications.
Hisham AlMajed, Ahmad AlMogren
doaj   +1 more source

ED25519: A New Secure Compatible Elliptic Curve for Mobile Wireless Network Security

open access: yesJordanian Journal of Computers and Information Technology, 2022
Wireless Sensor Networks (WSNs) create various security threats such as application variance in different sectors along with the model of cryptographic primitive and necessity.
MAUSAM DAS, Zenghui Wang
doaj   +1 more source

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

Elliptic Curve Cryptography with Machine Learning

open access: yesCryptography
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane   +3 more
doaj   +1 more source

A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication

open access: yesInternational Journal of Reconfigurable Computing, 2012
Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The security of ECC is due to the difficulty of solving the elliptic curve discrete logarithm problem (ECDLP).
Lyndon Judge   +2 more
doaj   +1 more source

An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for End-to-End Security in IoT Applications [PDF]

open access: yes, 1957
This paper presents a reconfigurable cryptographic engine that implements the DTLS protocol to enable end-to-end security for IoT. This implementation of the DTLS engine demonstrates 10x reduction in code size and 438x improvement in energy-efficiency ...
Banerjee, Utsav   +4 more
core   +6 more sources

Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve

open access: yesSensors, 2020
With the swift evolution of wireless technologies, the demand for the Internet of Things (IoT) security is rising immensely. Elliptic curve cryptography (ECC) provides an attractive solution to fulfill this demand.
Md. Mainul Islam   +4 more
doaj   +1 more source

Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik [PDF]

open access: yes, 2012
MODEL PROYEKSI (X/Z2, Y/Z2) PADA KURVA HESIAN SECARA PARALEL MENGGUNAKAN MEKANISME KRIPTOGRAFI KURVA ELIPTIKABSTRAK Suatu kunci publik, Elliptic Curve Cryptography (ECC) dikenal sebagai algoritma yang paling aman yang digunakan untuk memproteksi ...
Weku, W. (Winsy)
core  

Home - About - Disclaimer - Privacy