Zobrazeno 1 - 10
of 942
pro vyhledávání: '"elliptic curve cryptography (ECC)"'
Autor:
R. Kousalya, G.A. Sathish Kumar
Publikováno v:
Engineering Science and Technology, an International Journal, Vol 59, Iss , Pp 101887- (2024)
With the advancement of cutting-edge technologies, the Internet of Medical Things (IoMT) has assisted the healthcare sector by facilitating interaction between healthcare service providers and patients in remote areas. In IoMT, wearable or implantabl
Externí odkaz:
https://doaj.org/article/54d7987b2ed04ea0af98ca8ed6fd5d5c
Publikováno v:
IoT, Vol 5, Iss 2, Pp 290-310 (2024)
The rapid advancement of technology, alongside state-of-the-art techniques is at an all-time high. However, this unprecedented growth of technological prowess also brings forth potential threats, as oftentimes the security encompassing these technolo
Externí odkaz:
https://doaj.org/article/6b6271c9b87647a4b638a72438d1a08b
Publikováno v:
IEEE Access, Vol 12, Pp 147552-147563 (2024)
Elliptic curve cryptography (ECC) is largely deployed public key cryptographic algorithms in the design of key exchange, digital signature, and secure multiparty computation protocols. A compact and high-performance implementation of ECC is essential
Externí odkaz:
https://doaj.org/article/4ef2780c3abb4f8080a5a397044e12b8
Autor:
Sumit Singh Dhanda, Brahmjit Singh, Chia-Chen Lin, Poonam Jindal, Deepak Panwar, Tarun Kumar Sharma, Saurabh Agarwal, Wooguil Pak
Publikováno v:
IEEE Access, Vol 12, Pp 144304-144315 (2024)
The most widely used asymmetric cipher is ECC. It can be applied to IoT applications to offer various security services. However, a wide range of sectors have been investigated for applying ECC. The field of elliptic curve cryptographic processors fo
Externí odkaz:
https://doaj.org/article/6557e4fb15984cd4a63d2585daa4520a
Publikováno v:
Micromachines, Vol 15, Iss 10, p 1238 (2024)
With the development of mobile communication, digital signatures with low latency, low area, and high security are in increasing demand. Elliptic curve cryptography (ECC) is widely used because of its security and lightweight. Elliptic curve scalar m
Externí odkaz:
https://doaj.org/article/8b3095f7fbb9463e86193c6c05db4ed2
Publikováno v:
Applied Sciences, Vol 14, Iss 15, p 6664 (2024)
As a hot technology trend, the federated learning (FL) cleverly combines data utilization and privacy protection by processing data locally on the client and only sharing model parameters with the server, embodying an efficient and secure collaborati
Externí odkaz:
https://doaj.org/article/66dfcb48214e4f5aa609f07e801c66bf
Publikováno v:
IEEE Access, Vol 11, Pp 56649-56662 (2023)
Elliptic Curve Cryptography (ECC) based security protocols require much shorter key space which makes ECC the most suitable option for resource-limited devices as compared to the other public key cryptography (PKC) schemes. This paper presents a high
Externí odkaz:
https://doaj.org/article/ee06ac50f3c5483a8777287642d97b38
Publikováno v:
Journal of Education and Health Promotion, Vol 13, Iss 1, Pp 94-94 (2024)
BACKGROUND: Ensuring the security and privacy of patient data is a critical concern in the healthcare industry. The growing utilization of electronic data transmission and storage in medical records has amplified apprehensions about data security. Ho
Externí odkaz:
https://doaj.org/article/5fcb001423614c3aa0dd1287ad7008ca
Publikováno v:
E3S Web of Conferences, Vol 508, p 05009 (2024)
Elliptic Curve Cryptography (ECC), a significant modern cryptography, is more secure and robust than most others due to its construction using an elliptic curve and the application of mathematical operations for encryption and key generation. Further
Externí odkaz:
https://doaj.org/article/fc922fababfd4b6387f8491e29ce9733
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.