共 50 条
- [1] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1769 - 1784
- [2] DES Security Reinforcement Using Chaotic Logistic Map and Elliptic Curve Cryptography [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 54 - 57
- [4] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 547 - 566
- [6] Improoved MANET security using Elliptic Curve Cryptography and EAACK [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1125 - 1129
- [7] The advantages of elliptic curve cryptography for wireless security [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01): : 62 - 67
- [8] Mobile Communication Security using Galios field in Elliptic Curve Cryptography [J]. 2015 INTERNATIONAL CONFERENCE ON EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY (ICERECT), 2015, : 251 - 256
- [9] Improvement of existing security system by using Elliptic Curve and Biometric Cryptography [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 994 - 998
- [10] Augmented security for healthcare data using obfuscation and elliptic curve cryptography algorithm in health cloud environment [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (26):