To search, Click below search items.
All Published Papers Search Service
Title
Using Elliptic Curves on RFID Tags
Author
Michael Braun, Erwin Hess, Bernd Meyer
Vol. 8 No. 2 pp. 1-9
Keywords
RFID, Authentication, Elliptic Curve Cryptography, Privacy
An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
P.G.Rajeswari, K.Thilagavathi
Vol. 9 No. 2 pp. 176-185
Mobile Networks, Authentication Protocol, Pubic-key cryptography, Elliptic curves Elliptic Curve Cryptography (ECC), Key pair
An Effective Key Computation Protocol for Secure Group Communication in Heterogeneous Networks
S.Jabeenbegum, T.Purusothaman, Karthi.M, Balachandar.N, Arunkumar.N
Vol. 10 No. 2 pp. 313-319
Group Key Management, Secure Group Communication, Elliptic Curve Cryptography, Clustering, Complexity Analysis
Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
Makhamisa Senekane, Sehlabaka Qhobosheane, B.M. Taele
Vol. 11 No. 6 pp. 30-34
Diffie-Hellman, Elliptic Curve Cryptography, Field Programmable Gate Array, Galois Field, Picoblaze