[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bai et al., 2017 - Google Patents

Elliptic curve cryptography based security framework for Internet of Things (IoT) enabled smart card

Bai et al., 2017

Document ID
10783980618674044436
Author
Bai T
Raj K
Rabara S
Publication year
Publication venue
2017 World Congress on Computing and Communication Technologies (WCCCT)

External Links

Snippet

Smart cards are adopted by people worldwide for different applications and they are only intra domain oriented due to security concerns. The literature study reveals that research has been carried out all over the world to strengthen the security requirements of the smart …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Malani et al. Certificate-based anonymous device access control scheme for IoT environment
Bai et al. Elliptic curve cryptography based security framework for Internet of Things (IoT) enabled smart card
Chaudhry et al. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
EP3091690B1 (en) Rsa decryption using multiplicative secret sharing
EP3005608B1 (en) Authentication
EP2533460B1 (en) Digital signatures with implicit certificate chains
Yoon et al. A user friendly authentication scheme with anonymity for wireless communications
Zhang et al. An energy-efficient authentication scheme based on Chebyshev chaotic map for smart grid environments
CN109787758B (en) Anti-quantum computation MQV key agreement method and system based on private key pool and Elgamal
CN109936456B (en) Anti-quantum computation digital signature method and system based on private key pool
CN109921905B (en) Anti-quantum computation key negotiation method and system based on private key pool
Zhang et al. A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
Park et al. Anonymous authentication scheme based on NTRU for the protection of payment information in NFC mobile environment
US20140082361A1 (en) Data encryption
US20150006900A1 (en) Signature protocol
Shakiba Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks
Kuppuswamy et al. A new efficient digital signature scheme algorithm based on block cipher
EP4208982B1 (en) Method for electronic signing and authenticaton strongly linked to the authenticator factors possession and knowledge
Hajny et al. Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices
Chang et al. Novel untraceable authenticated key agreement protocol suitable for mobile communication
Kwon Virtual software tokens-a practical way to secure PKI roaming
Chen et al. Blockchain as a CA: A provably secure signcryption scheme leveraging blockchains
CN110572788B (en) Wireless sensor communication method and system based on asymmetric key pool and implicit certificate
Prakash et al. Digital Signatures and El Gamal Scheme Integration for Secure Data Transmission in Digital Transaction Survey
Prakasha et al. Enhanced authentication and key agreement mechanism using PKI