Application of elliptic curve cryptosystem for security protocol of wireless communication

被引:0
|
作者
Zhao, Lianggang
Chen, Kefei
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] The application of elliptic curve cryptosystem in wireless communication
    Jia, XY
    Wang, C
    [J]. IEEE 2005 INTERNATIONAL SYMPOSIUM ON MICROWAVE, ANTENNA, PROPAGATION AND EMC TECHNOLOGIES FOR WIRELESS COMMUNICATIONS PROCEEDINGS, VOLS 1 AND 2, 2005, : 1602 - 1605
  • [2] Security enhanced elliptic curve cryptosystem approach
    Zhang, Longjun
    Shen, Junyi
    Zhao, Lin
    [J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2001, 35 (10): : 1038 - 1041
  • [3] Elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1096 - 1100
  • [4] An elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 767 - 777
  • [5] Fast arithmetic of elliptic curve cryptosystem in mobile communication
    Ya-Lin, M
    Liang, Z
    Zheng-Zhong, B
    Ying-Chun, G
    [J]. 2005 IEEE/ACES INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND APPLIED COMPUTATIONAL ELECTROMAGNETICS, 2005, : 1055 - 1059
  • [6] An efficient two-factor authentication protocol based on elliptic curve cryptosystem with provable security
    Chen, Yulei
    Chen, Jianhua
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
  • [7] Elliptic curve cryptosystem
    Torii, Naoya
    Yokoyama, Kazuhiro
    [J]. Fujitsu Scientific and Technical Journal, 2000, 36 (02): : 140 - 146
  • [8] Elliptic curve cryptosystem
    Torii, N
    Yokoyama, K
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2000, 36 (02): : 140 - 146
  • [9] A security threshold subliminal channel based on elliptic curve cryptosystem
    Xie, Yuhua
    Sun, Xingming
    Xiang, Lingyun
    Luo, Gang
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 294 - 297
  • [10] Mobile SMS Banking Security Using Elliptic Curve Cryptosystem
    Soram, Ranbir
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (06): : 30 - 38