Author:
Gowtham M.,Pratish D. T.,Banga M. K.,Patil Mallanagouda
Reference13 articles.
1. Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proceedings of 6th international workshop cryptograph hardware embedded system, pp 119–132
2. Seo S, Bertino E (2013) Elliptic curve cryptography based certificateless hybrid sign-cryption scheme without pairing. CERIAS, West Lafayette, IN, USA, Tech. Rep. CERIAS TR 2013-10. https://www.cerias.purdue.edu/apps/reports_and_papers/.Seung-Hyun
3. Al-Riyami SS, Paterson KG (2013) Certificateless public key cryptography. In: Proceedings of 9th International Conference on ASIACRYPT, vol 2894, pp 452–473
4. Seo SH, Won J, Bertino E (2014) POSTER: a pairing-free certificate-less hybrid sign-cryption scheme for advanced metering infrastructures. In: Proceedings of 4th ACM CODASPY, pp 143–146
5. Agrawal S, Roman R, Das ML, Mathuria A, Lopez J (2012) A novel key update protocol in mobile sensor networks. In: Proceedings of 8th International Conference on ICISS, vol 7671, pp 194–207
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Blockchain-Based Secure Method for Tiger Detection Using Machine Learning;Convergence of Internet of Things and Blockchain Technologies;2021-09-01