Results 81 to 90 of about 423 (151)
BINARY EDWARDS CURVES IN ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
Edwards curves are a new normal form for elliptic curves that exhibit some cryp- tographically desirable properties and advantages over the typical Weierstrass form.
Enos, Graham +1 more
core
Editorial for the Special Issue on Micro Air Vehicles. [PDF]
Mohsan SAH, Khan MA, Karatas M.
europepmc +1 more source
Generalized ID-based elgamal signatures and extensions [PDF]
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilkent University, 2008.Thesis (Master's) -- Bilkent University, 2008.Includes bibliographical references leaves 58-62.ID-based cryptography helps us to ...
Kalkan, Said
core
A secure and efficient certificateless content extraction signature with privacy protection. [PDF]
Zhao C, Liu J, Zheng F, Wang D, Meng B.
europepmc +1 more source
An Efficient identity based Multi-receiver Signcryption Scheme using ECC [PDF]
Signcryption is a technique of performing signature and encryption in a single logical step. It is a secure and efficient technique of providing security between the sender and the receiver so that the data send by the sender should be made secure from ...
Shweta Khullar +2 more
core
Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment. [PDF]
Saha R +6 more
europepmc +1 more source
Multi-Recipient Signcryption for Secure Wireless Group Communication [PDF]
Secure group communication is significant for wireless and mobile computing. Overheads can be reduced efficiently when a sender sends multiple messages to multiple recipients using multi-recipient signcryption schemes.
Xiaolin Gui, Xu\u27an Wang, Yiliang Han
core
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives. [PDF]
Alagheband MR, Mashatan A.
europepmc +1 more source
Signcryption is a new cryptographic primitive which simultaneously provides both confidentiality and authenticity. Previously, these two goals had been considered separately, with encryption schemes providing confidentiality and signature schemes ...
Smith, Clayton D.
core
A Review of Functional Encryption in IoT Applications. [PDF]
Shahzad K, Zia T, Qazi EU.
europepmc +1 more source

