Results 61 to 70 of about 8,381 (240)

Analysis of Parallel Montgomery Multiplication in CUDA [PDF]

open access: yes, 2013
For a given level of security, elliptic curve cryptography (ECC) offers improved efficiency over classic public key implementations. Point multiplication is the most common operation in ECC and, consequently, any significant improvement in perfor- mance ...
Liu, Yuheng
core   +1 more source

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

Deployment and analysis of instance segmentation algorithm for in‐field yield estimation of sweet potatoes

open access: yesThe Plant Phenome Journal, Volume 8, Issue 1, December 2025.
Abstract Shape estimation of sweet potato (SP) storage roots is inherently challenging due to their varied size and shape characteristics. Even measuring “simple” metrics, such as length and diameter, requires significant time investments either directly in‐field or afterward using automated graders.
Hoang M. Nguyen   +8 more
wiley   +1 more source

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

Global Picture of Lunar Basalt Chronology Based on the Automatic Classification of Craters

open access: yesJournal of Geophysical Research: Planets, Volume 130, Issue 10, October 2025.
Abstract One major pathway for studying lunar volcanism evolution is to construct a timeline for the emplacement of basalts. The crater size‐frequency distribution (CSFD) is a pivotal method for dating lunar basalt units. Building upon two previously published lunar impact crater databases (diameters ≥1–2 km), this study integrated these databases and ...
Lan Jin   +9 more
wiley   +1 more source

An Enhancement of the Elliptic Curve Cryptography by Using the PairingFunction

open access: yesAcademic Science Journal
In this paper, we propose two new algorithms to increase the security of the Elliptic Curve Cryptography (ECC) by using a pairing function. The two algorithms are based on using two pairing functions, which are the Cantor pairing function and the Elegant
Sarah Hatem Namous   +2 more
doaj   +1 more source

Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]

open access: yes, 2015
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core   +1 more source

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms [PDF]

open access: yesEngineering and Technology Journal, 2014
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers
Hala Bahjat Abdul Wahab   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy