Suggested Topics within your search.
Suggested Topics within your search.
Authentication
3
Public key cryptography
3
Cryptography
2
Elliptic curve cryptography
2
elliptic curve cryptography (ECC)
2
Attribute-based
1
Attribute-based signatures
1
B-curves
1
Blind signatures
1
Chains
1
Computational efficiency
1
Computer Security
1
Confidentiality
1
Counterfeit Tag Detection
1
Counterfeit tag detection
1
Curve cryptography
1
Efficiency
1
Elliptic Curve Cryptography(ECC)
1
Elliptic curve
1
Elliptic curve discrete logarithm problem
1
Elliptic curve discrete logarithm problems
1
Embedded systems
1
Entropy
1
Fingerprint Recognition
1
Fingerprint recognition
1
Geometry
1
Hash functions
1
History of engineering & technology
1
History of engineering and technology
1
Humans
1
-
21
-
22
-
23
-
24
-
25by Hamed Bashirpour, Saman Bashirpour, Shahaboddin Shamshirband, Anthony T. ChronopoulosSubjects: “...elliptic curve cryptography (ECC)...”
Published 2018-03-01
Get full text
Article -
26by Josyula, Sai PrashanthSubjects: “...Elliptic curve cryptography...”
Published 2015
Get full text
Others -
27
-
28
-
29by Gaddam, ShravyaSubjects: “...Elliptic Curve Cryptography...”
Published 2016
Get full text
Others -
30
-
31
-
32
-
33
-
34
-
35by Alkhoraidly, Abdulaziz MohammadSubjects: “...Elliptic Curve Cryptography...”
Published 2011
Get full text
-
36
-
37
-
38by Alkhoraidly, Abdulaziz MohammadSubjects: “...Elliptic Curve Cryptography...”
Published 2011
Get full text
-
39
-
40by Mahmood A. Al-Shareeda, Mohammed Anbar, Selvakumar Manickam, Ayman Khalil, Iznan Husainy HasbullahSubjects: “...elliptic curve cryptography...”
Published 2021-01-01
Get full text
Article