Results 81 to 90 of about 7,729 (216)
Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips
Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID.
Zilong Liu+4 more
doaj +1 more source
A Survey Report On Elliptic Curve Cryptography [PDF]
The paper presents an extensive and careful study of elliptic curve cryptography (ECC) and its applications. This paper also discuss the arithmetic involved in elliptic curve and how these curve operations is crucial in determining the performance of ...
Dashputre, Samir+2 more
core +1 more source
Implementation of an Elliptic Curve Cryptography (ECC) algorithm in a microcontroller
The transmission of information in a secure manner has been since ancient times a challenge hard to tackle, starting from the immemorial Cesar cipher used by the Romans to the more modern techniques developed in the 20th century. With the coming age of the computer and the internet more advanced and sophisticated algorithms had to be made to resolve ...
openaire +1 more source
LightAuth: A Lightweight Sensor Nodes Authentication Framework for Smart Health System
ABSTRACT Counterfeit medical devices pose a threat to patient safety, necessitating a secure device authentication system for medical applications. Resource‐constrained sensory nodes are vulnerable to hacking, prompting the need for robust security measures.
Zain Ul Islam Adil+5 more
wiley +1 more source
Unconventional Anomalous Hall Effect Driven by Self‐Intercalation in Covalent 2D Magnet Cr2Te3
The unconventional anomalous Hall effect (AHE) in Cr2Te3, characterized by a sign change and humps and dips near the coercive field in its hysteresis, is attributed to an intrinsic mechanism dictated by self‐intercalated Cr atoms with spin canting, closely linked to multiple band anti‐crossings near the Fermi level. Abstract Covalent 2D magnets such as
Keke He+25 more
wiley +1 more source
COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS [PDF]
Cryptography is a well-known and well-researched topic for ages. Cryptography is the first line of defense for any networked system. By using Symmetric as well as Asymmetric Cryptography a lot of algorithms are developed. From the security point of view,
O Sri Nagesh, Vankamamidi S Naresh
doaj +1 more source
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary+5 more
doaj +1 more source
We develop an anonymous authentication scheme for smart cities based on physically unclonable function and user biometrics. This scheme is shown to be robust against active and passive attacks. ABSTRACT Smart cities amalgamate technologies such as Internet of Things, big data analytics, and cloud computing to collect and analyze large volumes of data ...
Vincent Omollo Nyangaresi+4 more
wiley +1 more source
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj +2 more sources
Grid computing is an emerging technology that enabled the heterogeneous collection of data and provisioning of services to the users. Due to the high amount of incoming heterogeneous request, grid computing needs an efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements.
Gangasandra Mahadevaiah Kiran+1 more
wiley +1 more source