Bai et al., 2017 - Google Patents
Elliptic curve cryptography based security framework for Internet of Things (IoT) enabled smart cardBai et al., 2017
- Document ID
- 10783980618674044436
- Author
- Bai T
- Raj K
- Rabara S
- Publication year
- Publication venue
- 2017 World Congress on Computing and Communication Technologies (WCCCT)
External Links
Snippet
Smart cards are adopted by people worldwide for different applications and they are only intra domain oriented due to security concerns. The literature study reveals that research has been carried out all over the world to strengthen the security requirements of the smart …
- 238000004891 communication 0 description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Malani et al. | Certificate-based anonymous device access control scheme for IoT environment | |
Bai et al. | Elliptic curve cryptography based security framework for Internet of Things (IoT) enabled smart card | |
Chaudhry et al. | A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography | |
EP3091690B1 (en) | Rsa decryption using multiplicative secret sharing | |
EP3005608B1 (en) | Authentication | |
EP2533460B1 (en) | Digital signatures with implicit certificate chains | |
Yoon et al. | A user friendly authentication scheme with anonymity for wireless communications | |
Zhang et al. | An energy-efficient authentication scheme based on Chebyshev chaotic map for smart grid environments | |
CN109787758B (en) | Anti-quantum computation MQV key agreement method and system based on private key pool and Elgamal | |
CN109936456B (en) | Anti-quantum computation digital signature method and system based on private key pool | |
CN109921905B (en) | Anti-quantum computation key negotiation method and system based on private key pool | |
Zhang et al. | A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm | |
Park et al. | Anonymous authentication scheme based on NTRU for the protection of payment information in NFC mobile environment | |
US20140082361A1 (en) | Data encryption | |
US20150006900A1 (en) | Signature protocol | |
Shakiba | Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks | |
Kuppuswamy et al. | A new efficient digital signature scheme algorithm based on block cipher | |
EP4208982B1 (en) | Method for electronic signing and authenticaton strongly linked to the authenticator factors possession and knowledge | |
Hajny et al. | Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices | |
Chang et al. | Novel untraceable authenticated key agreement protocol suitable for mobile communication | |
Kwon | Virtual software tokens-a practical way to secure PKI roaming | |
Chen et al. | Blockchain as a CA: A provably secure signcryption scheme leveraging blockchains | |
CN110572788B (en) | Wireless sensor communication method and system based on asymmetric key pool and implicit certificate | |
Prakash et al. | Digital Signatures and El Gamal Scheme Integration for Secure Data Transmission in Digital Transaction Survey | |
Prakasha et al. | Enhanced authentication and key agreement mechanism using PKI |