1. Hai-peng, C., Xuan-jing, S., Wei, W.: Digital signature algorithm based on hash round function and self-certified public key system. In: First International Workshop on Education Technology and Computer Science (2009)
2. Kumar, P., Sain, M., Lee, H.J.: An efficient two-factor user authentication framework for wireless senor networks. In: ICACT (2011)
3. Agnew, G., Mullin, R., Vanstone, S.: An implementation of elliptic curve cryptosystems over 2155. IEEE J. Sel. Areas Commun. 11, 804–813 (1993)
4. Romney, W.: Digital signature signing engine to protect the integrity of digital assets by Gordon, 1-4244-0406-1/06/$20.00 ©2006 IEEE (2006)
5. Abdullaev, A., Al-Absi, M.A., Al-Absi, A.A., Sain, M., Lee, H.J.: Survey on digital signature algorithms. In: International Conference on Culture Technology (ICCT), pp. 408–411. Zhijiang College of Zhejiang University of Technology Shaoxing, China, 15–18 Nov 2018 (2018)