共 50 条
- [1] Improvement of existing security system by using Elliptic Curve and Biometric Cryptography [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 994 - 998
- [2] The advantages of elliptic curve cryptography for wireless security [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01): : 62 - 67
- [3] An RNS Implementation of the Elliptic Curve Cryptography for IoT Security [J]. 2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 66 - 72
- [5] Improvement and Implementation of One Elliptic Curve Cryptography Algorithm [J]. INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT (EBM2011), VOLS 1-6, 2011, : 2438 - 2440
- [6] Elliptic Curve Cryptography with Security System in Wireless Sensor Networks [J]. IAENG TRANSACTIONS ON ENGINEERING TECHNOLOGIES, VOL 5, 2010, 1285 : 519 - 531
- [7] DES Algorithm Security Fortification Using Elliptic Curve Cryptography [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 335 - 340
- [8] Improoved MANET security using Elliptic Curve Cryptography and EAACK [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1125 - 1129
- [9] Security in Data Forwarding Through Elliptic Curve Cryptography in Cloud [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1083 - 1088
- [10] Security approaches based on elliptic curve cryptography in wireless sensor networks [J]. 2015 27TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2015, : 35 - 38