Better burst detection

X Zhang, D Shasha - 22nd International Conference on Data …, 2006 - ieeexplore.ieee.org
A burst is a large number of events occurring within a certain time window. Many data
stream applications require the detection of bursts across a variety of window sizes. For …

Secure framework for future smart city

H Djigal, F Jun, J Lu - … Conference on Cyber Security and Cloud …, 2017 - ieeexplore.ieee.org
With the recent advancements in the information and communication technologies, large
number of devices are connecting to the Internet, hence large volumes of data in different …

MFZKAP: multi factor zero knowledge proof authentication for secure service in vehicular cloud computing

N Hegde, SS Manvi - 2019 Second International Conference …, 2019 - ieeexplore.ieee.org
In vehicular cloud computing, a number of vehicle users act as nodes and communicate with
each other to obtain location based services and data. Malicious users or service providers …

[PDF][PDF] Endomorphisms on elliptic curves for optimal subspaces and applications to differential equations and nonlinear cryptography

O Ticleanu - Electronic Journal of Differential Equations, 2015 - ejde.math.txstate.edu
Finite spaces are used on elliptic curves cryptography (ECC) to define the necessary
parameters for nonlinear asymmetric cryptography, and to optimize certain solutions of …

[PDF][PDF] A secure and efficient authentication protocol based on elliptic curve diffie-hellman algorithm and zero knowledge property

M Kumar - International Journal of Soft Computing and …, 2013 - Citeseer
Elliptic curves have been extensively studied for over hundred years, originally pursued
mainly for aesthetic reasons; elliptic curves have recently become a tool in several important …

[PDF][PDF] An implementation of digital signature and key agreement on IEEE802. 15.4 WSN embedded device

A Sudarsono, M Yuliana - Industrial Electronics Seminar (IES 2012), 2012 - repo.pens.ac.id
A wireless sensor network (WSN) now becomes popular in context awareness development
to distribute critical information and provide knowledge services to everyone at anytime and …

An efficient authentication protocol using zero knowledge property and pairing on elliptic curves.

M Kumar - International Journal of Advanced Research in …, 2017 - search.ebscohost.com
The systematic introduction to zero knowledge proof protocol has important theoretical
guidance and practical significance on attracting more scholars involved in research as well …

[PDF][PDF] An Efficient Zero Knowledge Identification Protocol Based on Weil Pairing on Elliptic Curves

M Kumar - Department of Applied Science - academia.edu
In cryptography, zero-knowledge proofs were first conceived in 1985 by Shafi Golwasser,
Silvio Micalli and Charles Rackoff in a draft of the knowledge complexity of interactive proof …

An Implementation of Digital Signature and Key Agreement on IEEE802. 15.4 WSN Embedded Device

S Amang, Y Mike - repo.pens.ac.id
A wireless sensor network (WSN) now becomes popular in context awareness development
to distribute critical information and provide knowledge services to everyone at anytime and …