Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support

S Park, B Aslam, D Turgut… - Security and …, 2013 - Wiley Online Library
In this paper, we propose two certificate mechanisms for preventing the Sybil attack in a
vehicular ad hoc network (VANET): the timestamp series approach and the temporary …

An identity-based elliptic curve cryptography for mobile payment security

OR Vincent, TM Okediran, AA Abayomi-Alli… - SN Computer …, 2020 - Springer
Security breaches have been observed in different dimensions in mobile payment system.
The violation of user's privacy is a common phenomenon in mobile payment transactions …

Comparison of ECC and RSA algorithm in multipurpose smart card application

M Savari, M Montazerolzohour… - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
The main role of encryption algorithms is to keep devises safe from attack. Using the best
and more efficient algorithm for a device according to its storage and amount of data transfer …

All about encryption in smart card

M Savari, M Montazerolzohour - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
Smart cards are one of the efficient devices in providing security in some systems. Smart
cards are secured with using encryption algorithms. Finding the best algorithm in smart …

A key agreement authentication protocol using an improved parallel pollard rho for electronic payment system

OR Vincent, OM Lawal - The Journal of Supercomputing, 2018 - Springer
An improved protocol with a key agreement authentication using parallel Pollard rho
algorithm for electronic payment system is proposed in this paper. The protocol employs a …

Combining encryption methods in multipurpose smart card

M Savari, M Montazerolzohour… - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
Smart cards have many applications such as health, ID verification and access control,
electronic purse card, banking card, payphone card, passport card and license card. Since …

Tutorial on Elliptic Curve Arithmetic and Introduction to Elliptic Curve Cryptography (ECC)

NVRS Bommireddipalli - 2017 - rave.ohiolink.edu
This thesis focuses on elliptic curve arithmetic over the prime field GF (p) and elliptic curve
cryptography (ECC). ECC over GF (p) has its own arithmetic which is done over elliptic …

[引用][C] Detection of Sybil attacks in vehicular ad hoc networks based on road side unit support

MS Naveed, MH Islam - Int. J. Sci. Eng. Res, 2015