Privacy enhanced cellular access security
Proceedings of the 4th ACM workshop on Wireless security
Privacy Enhanced Mobile Authentication
Wireless Personal Communications: An International Journal
D-cash: A flexible pre-paid e-cash scheme for date-attachment
Electronic Commerce Research and Applications
COMBINE: leveraging the power of wireless peers through collaborative downloading
Proceedings of the 5th international conference on Mobile systems, applications and services
A new security scheme for on-demand source routing in mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Information Sciences: an International Journal
Optimization Algorithm for Scalar Multiplication in the Elliptic Curve Cryptography over Prime Field
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Theoretical and Methodological Issues
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Knapsack based ECC for digital signature authentication
International Journal of Communication Networks and Distributed Systems
An efficient authentication scheme for access control in mobile pay-TV systems
IEEE Transactions on Multimedia
IEEE Transactions on Wireless Communications
Secure access of smart cards using elliptic curve cryptosystems
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A study of elliptic curve cryptography and its application
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Journal of Systems and Software
Secure signed radix-r recoding methods for constrained-embedded devices
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
Public key cryptographic system using mandelbrot sets
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Improved security in IEEE 802.11 wireless LANs
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
Prevention of wormhole attacks in mobile commerce based on non-infrastructure wireless networks
Electronic Commerce Research and Applications
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i)
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Location privacy for cellular systems; analysis and solution
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Location proofing using identity based encryption and the Google cloud on the mobile applications
Proceedings of the 50th Annual Southeast Regional Conference
Efficient password authenticated key agreement using bilinear pairings
Mathematical and Computer Modelling: An International Journal
On a framework for energy-efficient security protocols in wireless networks
Computer Communications
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
A secure on-demand source routing scheme using hierarchical clustering in mobile ad hoc networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
SPA countermeasure based on unsigned left-to-right recodings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
An adaptable and scalable group access control scheme for managing wireless sensor networks
Telematics and Informatics
Information Sciences: an International Journal
Cryptography with fast point multiplication by using ASCII codes and its implementation
International Journal of Communication Networks and Distributed Systems
A new elliptic curve cryptosystem for securing sensitive data applications
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.00 |
This article provides an overview of elliptic curves and their use in cryptography. The focus is on the performance advantages to be obtained in the wireless environment by using elliptic curve cryptography instead of a traditional cryptosystem like RSA. Specific applications to secure messaging and identity-based encryption are discussed.