Author:
Roy Swapnoneel,Khatwani Chanchal
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software
Reference41 articles.
1. Elliptical Curve Cryptography (ECC)http://searchsecurity.techtarget.com/definition/elliptical-curve-cryptography/
2. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
3. A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography;Chuang,2015
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献