Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Soram Ranbir Singh"'
Autor:
Soram Ranbir Singh, Khan Kumar Ajoy
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 17:115-121
With the advancements in wireless internet technology, a new computing ecosystem, the Internet of Things(IoT), has ushered in numerous devices in many areas in our life as well as in industries. The IoT is a computing notion that describes a scenario
Autor:
Khan Kumar Ajoy, Soram Ranbir Singh
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 17:402-408
The Internet of Things (IoT) has ushered in numerous devices in many areas in our life and in industries. It could comprise devices with sensors to gather and broadcast data over the internet. As the devices are IP-based and the media are shared, any
Autor:
Soram Ranbir Singh, Khan Kumar Ajoy
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 17:409-417
Wireless sensor network (WSN) is a growing expertise which has been used in many areas such as airports, smart watches, smart cities, smart health organizations, and smart homes. It has provided mankind with a lot of benefits in different areas and d
Publikováno v:
Indian Journal of Science and Technology. 10:1-7
Objectives: Our objective is to design a new key management scheme for wireless sensor networks. Methods/Analysis: The paper describes an effective and novel key management scheme for wireless sensor networks using elliptic curve public key cryptosys
Publikováno v:
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).
RSA and Elliptic Curve Cryptography (ECC) are the most common public cryptographic algorithms for encryption of symmetric keys which are used in https protocol and for digital signatures. The beauty of using ECC instead of using RSA is that machines
Publikováno v:
2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT).
Elliptic curve cryptosystem has been heavily studied by computer scientists for many decades. This form of cryptosystem is based on elliptic curves over some Galois fields. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosyste