Year of publication
Type of material
Licence
Language
1–20 of 1,664 hits
Sort by:
Sort by:
-
On cryptographic protocols employing asymmetric pairings — The role of revisited
Elsevier | 2011|Keywords: Elliptic curve cryptography -
A secure authentication scheme for Internet of Things
Elsevier | 2017|Keywords: Elliptic curve cryptography -
Arithmetic using compression on elliptic curves in Huff's form and its applications
Free accessBASE | 2021|Keywords: Elliptic curve cryptography -
Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security
Taylor & Francis Verlag | 2018|Keywords: elliptic curve cryptography -
Elliptic Curve Cryptography hardware accelerator for high-performance secure servers
Online Contents | 2018|Keywords: Elliptic Curve Cryptography -
An efficient two‐party authentication key exchange protocol for mobile environment
Wiley | 2017|Keywords: elliptic curve cryptography -
Cryptanalysis and improvement of authentication scheme for roaming service in ubiquitous network
Taylor & Francis Verlag | 2020|Keywords: elliptic curve cryptography -
Anonymous authentication scheme for smart home environment with provable security
Elsevier | 2019|Keywords: Elliptic curve cryptography -
An enhanced authentication with key agreement scheme for satellite communication systems
Wiley | 2018|Keywords: elliptic curve cryptography -
EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario
Wiley | 2022|Keywords: elliptic curve cryptography -
Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol
Online Contents | 2014|Keywords: Elliptic curve cryptography -
Notes on “Secure authentication scheme for IoT and cloud servers”
Elsevier | 2015|Keywords: Elliptic curve cryptography -
Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs
Online Contents | 2019|Keywords: Elliptic curve cryptography -
A secure and efficient identity‐based mutual authentication scheme with smart card using elliptic curve cryptography
Wiley | 2017|Keywords: elliptic curve cryptography -
Constructive and destructive use of compilers in elliptic curve cryptography
Free accessBASE | 2009|Keywords: Elliptic curve cryptography, Elliptic curve cryptography (ECC) -
A multi-tier security system (SAIL) for protecting audio signals from malicious exploits
Online Contents | 2018|Keywords: Elliptic curve cryptography -
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
Wiley | 2020|Keywords: elliptic curve cryptography -
Montgomery curves and their arithmetic
Online Contents | 2018|Keywords: Elliptic curve cryptography -
Medical image encryption based on improved ElGamal encryption technique
Elsevier | 2017|Keywords: Elliptic curve cryptography -
Secure authentication scheme for IoT and cloud servers
Elsevier | 2015|Keywords: Elliptic Curve Cryptography
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.