Search

Your search keyword '"Elliptic Curve Digital Signature Algorithm"' showing total 1,379 results

Search Constraints

Start Over You searched for: Descriptor "Elliptic Curve Digital Signature Algorithm" Remove constraint Descriptor: "Elliptic Curve Digital Signature Algorithm" Language undetermined Remove constraint Language: undetermined
1,379 results on '"Elliptic Curve Digital Signature Algorithm"'

Search Results

1. Storing information of stroke rehabilitation patients using blockchain technology

2. Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm

3. Review and analysis of classical algorithms and hash-based post-quantum algorithm

4. Elliptic Curve Digital Signature Algorithm Challenges and Development Stages

5. NOMOP-ECDSA: A Lightweight ECDSA Engine for Internet of Things

6. SCAB - IoTA: Secure communication and authentication for IoT applications using blockchain

7. Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities

8. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary

9. IMPLEMENTASI ALGORITMA TANDA TANGAN DIGITAL BERBASIS KRIPTOGRAFI KURVA ELIPTIK DIFFIE-HELLMAN

10. White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode

11. Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption

12. Analysis of the Security of Internet of Multimedia Things

13. WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger

14. Secure and Efficient Data Collection and Storage of IoT in Smart Ocean

15. Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers

16. Baguena: A Practical Proof of Stake Protocol with a Robust Delegation Mechanism

17. Minerva: The curse of ECDSA nonces

19. Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA

20. End-to-end automated cache-timing attack driven by machine learning

21. Bitcoin security with a twisted Edwards curve

22. Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks

23. A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications

24. Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols

25. ECDSA weak randomness in Bitcoin

26. Practical Escrow Protocol for Bitcoin

27. Blockchain Technology on the Way of Autonomous Vehicles Development

29. Efficient Online-friendly Two-Party ECDSA Signature

30. The Exact Security of BIP32 Wallets

31. PPP/PPP-RTK Message Authentication

32. On SBAS Authentication with OTAR Schemes

33. Fast Secure Two-Party ECDSA Signing

34. On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT

35. Improved Elliptic Curve Digital Signature Algorithm in Wireless Sensor Networks

36. Quantum Safe Cloud Computing Using Hash-based Digital Signatures

37. Secure Transmission of Medical Images using Improved Hybrid Cryptosystem: Authentication, Confidentiality and Integrity

38. RETRACTED ARTICLE: An hybrid security framework using internet of things for healthcare system

39. A Scalable, Lightweight and Secure IoT Device Connector Service Using MQTT and ECC

40. A Privacy-Preserving Enforced Bill Collection System using Smart Contracts

41. Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC

42. Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks

43. Advances of SBAS authentication technologies

44. A Secure Device Access Based on Blockchain for IoT in Smart City

45. Design and Execution of Highly Adaptable Elliptic Curve Cryptographic Processor and Algorithm on FPGA using Verilog HDL

46. Empirical Study of Standard Elliptic Curve Domain Parameters for IoT Devices

47. EECDH to prevent MITM attack in cloud computing

48. Стійкість модифікованого цифрового підпису EdDSA

50. ECDSA-Based Message Authentication Scheme for BeiDou-II Navigation Satellite System

Catalog

Books, media, physical & digital resources