Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Secure and efficient protocol for vehicular ad hoc network with privacy preservation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Hi-index | 0.00 |
This paper describes the Elliptic Curve Cryptography algorithm and its suitability for smart cards.