Authentication protocol based on ellipitc curve cryptography

N Constantinescu - Annals of the University of Craiova-Mathematics and …, 2010 - inf.ucv.ro
The authentication protocols based on classic cryptography use public-key cryptosystems
for establishing the common key. Some of them have been proven to be secure but they …

[PDF][PDF] Endomorphisms on elliptic curves for optimal subspaces and applications to differential equations and nonlinear cryptography

O Ticleanu - Electronic Journal of Differential Equations, 2015 - ejde.math.txstate.edu
Finite spaces are used on elliptic curves cryptography (ECC) to define the necessary
parameters for nonlinear asymmetric cryptography, and to optimize certain solutions of …

A prefix-based approach for managing hybrid specifications in complex packet filtering

NB Neji, A Bouhoula - Computer Networks, 2012 - Elsevier
The coexistence of range-based and prefix-based fields within the filtering policy is one of
the most important causes that make the packet filtering problem difficult to solve and the …

Providing trust based key exchange security approach for intrusion detection using recommendation metrics over Manet (Skite) Stv

S Saravanan, RM Chandrasekaran… - Advances in Natural and …, 2015 - go.gale.com
Establishing trust relationship among MANET nodes to secure a session is highly
demandable research work. SKITE discusses about recommendation trust values which …

Digital voting system based on blockchain technology

MBA Al-Rawy - 2018 - acikerisim.aksaray.edu.tr
In recent years, blockchain technology has, to a large extent, affected all aspects of life,
however, until now, elections have not received their share of blockchain support and paper …