Author:
Menaka R.,Neela Madheswari A.,Wahida Banu R. S. D.
Reference8 articles.
1. Thilagavathi K, Rajeswari PG (2012) Efficiency and Effectiveness analysis over ECC-based direct and indirect authentication protocols: an extensive comparative study. ICTACT J Commun Technol 3:512–524
2. Mahto D, Yadav DK (2018) Performance analysis of RSA and elliptic curve cryptography. Int J Netw Secur 20:625–635
3. Sanchez-Pi N, Carbo J, Molina JM (2012) A knowledge-based system approach for a context-aware system. Knowledge-based systems, Elsevier (2012)
4. Priyadarshini M, Suganya I, Saravanan N (2013) A security gateway for message exchange in services by streaming and validation. Int J Inno Res Comput Commun Eng 1
5. Salas MIP, Martins E (2014) Security testing methodology for vulnerabilities detection of XSS. In: Web services and WS-security. Electronic notes in theoretical computer science, Elsevier