Suggested Topics within your search.
Suggested Topics within your search.
Authentication
3
Public key cryptography
3
Cryptography
2
Elliptic curve cryptography
2
elliptic curve cryptography (ECC)
2
Attribute-based
1
Attribute-based signatures
1
B-curves
1
Blind signatures
1
Chains
1
Computational efficiency
1
Computer Security
1
Confidentiality
1
Counterfeit Tag Detection
1
Counterfeit tag detection
1
Curve cryptography
1
Efficiency
1
Elliptic Curve Cryptography(ECC)
1
Elliptic curve
1
Elliptic curve discrete logarithm problem
1
Elliptic curve discrete logarithm problems
1
Embedded systems
1
Entropy
1
Fingerprint Recognition
1
Fingerprint recognition
1
Geometry
1
Hash functions
1
History of engineering & technology
1
History of engineering and technology
1
Humans
1
-
81
-
82
-
83
-
84
-
85
-
86by Pabbuleti, Krishna ChaitanyaSubjects: “...Elliptic Curve Cryptography...”
Published 2014
Get full text
Others -
87
-
88
-
89
-
90by Χριστόπουλος, Ρένος-ΝεκτάριοςSubjects: “...Elliptic curve cryptography (ECC)...”
Published 2013
Get full text
-
91
-
92
-
93
-
94by Ridgdill, Penny CatherineSubjects: “...Elliptic Curve Cryptography...”
Published 2010
Get full text
Get full text
Others -
95by Chiranji Lal Chowdhary, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan P., Muhammad Fazal IjazSubjects: “...elliptic curve cryptography...”
Published 2020-09-01
Get full text
Article -
96
-
97Subjects: “...video encryption, Mobile Application, encryption, decryption, confidentiality, elliptic curve...”
Get full text
Article -
98
-
99
-
100