Cargando…
An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level...
Autores principales: | Muthurajan, Vinothkumar, Narayanasamy, Balaji |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4770155/ https://www.ncbi.nlm.nih.gov/pubmed/26981584 http://dx.doi.org/10.1155/2016/4913015 |
Ejemplares similares
-
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
por: Chin, Ji-Jian, et al.
Publicado: (2015) -
A Secure and reliable RFID authentication protocol using digital schnorr cryptosystem for IoT-enabled healthcare in COVID-19 scenario
por: Shariq, Mohd, et al.
Publicado: (2021) -
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
por: Tidrea, Alexandra, et al.
Publicado: (2023) -
Elliptic functions and elliptic curves
por: Du Val, Patrick
Publicado: (1973) -
Elliptic curves
por: Husemöller, Dale
Publicado: (1987)