共 50 条
[22]
Trading Inversions for Multiplications in Elliptic Curve Cryptography
[J].
Designs, Codes and Cryptography,
2006, 39
:189-206
[24]
Development of security scheme on wireless sensor network based on Elliptic Curve Cryptography
[J].
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMMERCE AND SOCIETY,
2015, 17
:630-634
[25]
An Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography
[J].
NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY,
2009,
:474-+
[26]
A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks
[J].
2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN),
2016,
:1166-1170
[28]
Selection of Security Elliptic Curve Based on Evolution Algorithm
[J].
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL I,
2009,
:55-+
[29]
On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography
[J].
2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY COMPANION, QRS-C,
2022,
:758-759
[30]
Catalan's Conjecture and Elliptic Curve Cryptography (CCECC) Algorithm for Enhancing Data Security During Data Transmission in MANET
[J].
COMPUTING SCIENCE, COMMUNICATION AND SECURITY, COMS2 2024,
2025, 2174
:245-254