共 50 条
- [31] Deniable authentication protocol based on elliptic curve cryptography 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
- [32] An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security 2005 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2005, : 376 - 380
- [33] A Systematic Way to Provide Security for Digital Signature Using Elliptic Curve Cryptography INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (07): : 154 - 158
- [35] DES Security Reinforcement Using Chaotic Logistic Map and Elliptic Curve Cryptography 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 54 - 57
- [36] Enhanced Performance and Data Security using Elliptic Curve Cryptography in Cloud Environment 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 869 - 873
- [37] Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography 2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
- [38] A security protocol for D2D communications in 5G networks using elliptic curve cryptography International Journal of Information Security, 2022, 21 : 1389 - 1408
- [40] An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2013, 16 (04): : 324 - 335