A survey on security of mobile handheld devices through elliptic curve cryptography
暂无分享,去创建一个
[1] Zoltán Ádám Mann,et al. IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY ON PC AND SMART CARD , 2003 .
[2] Kakali Chatterjee,et al. Timestamp Based Authentication Protocol for Smart Card Using ECC , 2011, WISM.
[3] Hyun-A Park. Secure chip based encrypted search protocol in mobile office environments , 2016 .
[4] Sharad Kumar Verma. A Discussion on Elliptic Curve Cryptography and Its Applications , 2012 .
[5] K. Sathish Kumar,et al. An Experimental Study on Energy Consumption of Cryptographic Algorithms for Mobile Hand-Held Devices , 2012 .
[7] Dr. E. Karthikeyan,et al. Survey of Elliptic Curve Scalar Multiplication Algorithms , 2012 .
[9] Amit Sinhal,et al. Block based text data partition with RC4 encryption for text data security , 2016 .
[10] Marisa W. Paryasto,et al. Issues in Elliptic Curve Cryptography Implementation , 2009 .
[11] Sheetal Kalra,et al. Elliptic curve cryptography: survey and its security applications , 2011, ACAI '11.
[12] Chu-Hsing Lin,et al. Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[13] Sheetal Kalra,et al. Efficient password-authenticated key agreement protocol for smart cards based on ECC , 2013, Int. J. Multim. Intell. Secur..
[14] Raju Nedunchezhian,et al. Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing , 2014, Int. Arab J. Inf. Technol..