Results 81 to 90 of about 7,729 (216)

Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips

open access: yesSensors, 2014
Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID.
Zilong Liu   +4 more
doaj   +1 more source

A Survey Report On Elliptic Curve Cryptography [PDF]

open access: yes, 2011
The paper presents an extensive and careful study of elliptic curve cryptography (ECC) and its applications. This paper also discuss the arithmetic involved in elliptic curve  and how these curve operations is crucial in determining the performance of ...
Dashputre, Samir   +2 more
core   +1 more source

Implementation of an Elliptic Curve Cryptography (ECC) algorithm in a microcontroller

open access: yes, 2022
The transmission of information in a secure manner has been since ancient times a challenge hard to tackle, starting from the immemorial Cesar cipher used by the Romans to the more modern techniques developed in the 20th century. With the coming age of the computer and the internet more advanced and sophisticated algorithms had to be made to resolve ...
openaire   +1 more source

LightAuth: A Lightweight Sensor Nodes Authentication Framework for Smart Health System

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
ABSTRACT Counterfeit medical devices pose a threat to patient safety, necessitating a secure device authentication system for medical applications. Resource‐constrained sensory nodes are vulnerable to hacking, prompting the need for robust security measures.
Zain Ul Islam Adil   +5 more
wiley   +1 more source

Unconventional Anomalous Hall Effect Driven by Self‐Intercalation in Covalent 2D Magnet Cr2Te3

open access: yesAdvanced Science, Volume 12, Issue 2, January 13, 2025.
The unconventional anomalous Hall effect (AHE) in Cr2Te3, characterized by a sign change and humps and dips near the coercive field in its hysteresis, is attributed to an intrinsic mechanism dictated by self‐intercalated Cr atoms with spin canting, closely linked to multiple band anti‐crossings near the Fermi level. Abstract Covalent 2D magnets such as
Keke He   +25 more
wiley   +1 more source

COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS [PDF]

open access: yesInternational Journal of Industrial Engineering and Production Research, 2020
Cryptography is a well-known and well-researched topic for ages. Cryptography is the first line of defense for any networked system. By using Symmetric as well as Asymmetric Cryptography a lot of algorithms are developed. From the security point of view,
O Sri Nagesh, Vankamamidi S Naresh
doaj   +1 more source

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

open access: yesSensors, 2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary   +5 more
doaj   +1 more source

Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
We develop an anonymous authentication scheme for smart cities based on physically unclonable function and user biometrics. This scheme is shown to be robust against active and passive attacks. ABSTRACT Smart cities amalgamate technologies such as Internet of Things, big data analytics, and cloud computing to collect and analyze large volumes of data ...
Vincent Omollo Nyangaresi   +4 more
wiley   +1 more source

RFID security authentication scheme based on Montgomery-form elliptic curve cryptography

open access: yesDianxin kexue, 2016
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj   +2 more sources

SparkGrid: Blockchain Assisted Secure Query Scheduling and Dynamic Risk Assessment for Live Migration of Services in Apache Spark‐Based Grid Environment

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
Grid computing is an emerging technology that enabled the heterogeneous collection of data and provisioning of services to the users. Due to the high amount of incoming heterogeneous request, grid computing needs an efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements.
Gangasandra Mahadevaiah Kiran   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy