Search

Your search keyword '"Elliptic Curve Digital Signature Algorithm"' showing total 1,549 results

Search Constraints

Start Over You searched for: Descriptor "Elliptic Curve Digital Signature Algorithm" Remove constraint Descriptor: "Elliptic Curve Digital Signature Algorithm"
1,549 results on '"Elliptic Curve Digital Signature Algorithm"'

Search Results

1. Interoperable IoRT for Healthcare: Securing Intelligent Systems with Decentralized Blockchain

2. Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture.

3. Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture

4. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary.

5. A unique secure multimodal biometrics-based user anonymous authenticated key management protocol (SMUAAKAP) based on block chain mechanism for generic HIoTNs.

6. An Efficient Security Mechanism for Cloud Data Using Elliptic Curve Digital Signature Algorithm with Wake–Sleep

7. Attacking (EC)DSA with partially known multiples of nonces.

8. Attacking (EC)DSA scheme with ephemeral keys sharing specific bits.

9. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary

10. Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm.

11. Enhancing an Attack to DSA Schemes

12. Formal verification for a PMQTT protocol

13. Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

15. Refund Attacks on Bitcoin’s Payment Protocol

16. Formal verification for a PMQTT protocol.

17. A new enhancement of elliptic curve digital signature algorithm.

18. Big Data Security

21. On the Malleability of Bitcoin Transactions

22. Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage

23. Just a Little Bit More

24. Revisited—The Subliminal Channel in Blockchain and Its Application to IoT Security

26. Storing information of stroke rehabilitation patients using blockchain technology

27. New lattice attacks on DSA schemes

28. Lattice Attacks on DSA Schemes Based on Lagrange’s Algorithm

29. FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things

30. Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack

32. Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm

33. Review and analysis of classical algorithms and hash-based post-quantum algorithm

37. Template Attacks on ECDSA

38. Pseudo-randomness Inside Web Browsers

39. Elliptic Curve Digital Signature Algorithm Challenges and Development Stages

40. NOMOP-ECDSA: A Lightweight ECDSA Engine for Internet of Things

41. SCAB - IoTA: Secure communication and authentication for IoT applications using blockchain

43. Secure embedded OS image signing

44. RF-DNA: Radio-Frequency Certificates of Authenticity

45. Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus

46. On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan

47. Accelerated Verification of ECDSA Signatures

48. Secure embedded OS image signing

49. Enforcing Email Addresses Privacy Using Tokens

50. Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities

Catalog

Books, media, physical & digital resources