메뉴 건너뛰기




Volumn , Issue , 2007, Pages 239-244

Implementation of elliptic-curve cryptography on mobile healthcare devices

Author keywords

Cryptographic techniques; Digital signature algorithm; Elliptical curve cryptography; Mobile device security; Remote patient monitoring applications

Indexed keywords

AUTHENTICATION; BIOMEDICAL EQUIPMENT; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PATIENT MONITORING; PERSONAL DIGITAL ASSISTANTS;

EID: 34748850632     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNSC.2007.372784     Document Type: Conference Paper
Times cited : (27)

References (16)
  • 6
    • 34748823122 scopus 로고    scopus 로고
    • accessed from Last checked 14 November
    • ECC Cryptography Tutorial accessed from http://www.certicom.com/index. php?action=ecc.ecc_tutorial Last checked 14 November 2006
    • (2006) ECC Cryptography Tutorial
  • 7
    • 34748848840 scopus 로고    scopus 로고
    • accessed from
    • Orange SPV M 5000 User Manual accessed from http://img.orange.ch/static/ Content/documents/General/MobilePhone/Phones/spv_m5000_manual_en.pdf
    • Orange SPV M 5000 User Manual
  • 8
    • 34748857558 scopus 로고    scopus 로고
    • accessed from Last checked 14 November
    • Bouncy Castle Cryptography accessed from http://www.bouncycastle.org Last checked 14 November 2006
    • (2006) Bouncy Castle Cryptography
  • 9
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography, Advances in Cryptology-CRYPTO '85, Lecture Notes in Computer Science
    • V. Miller, Uses of elliptic curves in cryptography, Advances in Cryptology-CRYPTO '85, Lecture Notes in Computer Science, Springer-Verlag, 218 (1986) pp. 417-426.
    • (1986) Springer-Verlag , vol.218 , pp. 417-426
    • Miller, V.1
  • 10
    • 34748846471 scopus 로고    scopus 로고
    • accessed from Last checked 14 November
    • Elliptic Curve Cryptography Whitepaper accessed from http://www. thalesesecurity.com/Whitepapers/documents/eliptic_curve_cryptography2.pdf Last checked 14 November 2006
    • (2006) Elliptic Curve Cryptography Whitepaper
  • 11
    • 24744434189 scopus 로고    scopus 로고
    • Elliptic Curve Public-Key Cryptosystems: An Introduction
    • Springer Verlag, June to 141
    • Dewin, E. and B. Preneel, "Elliptic Curve Public-Key Cryptosystems: An Introduction." LNCS 1528, Springer Verlag, June 1997, pp. 131 to 141.
    • (1997) LNCS , vol.1528 , pp. 131
    • Dewin, E.1    Preneel, B.2
  • 15
    • 34748832428 scopus 로고    scopus 로고
    • Elliptic Curve Cryptography, Standards for Efficient Cryptography Version 1.0, September 2000 accessed from
    • Elliptic Curve Cryptography, Standards for Efficient Cryptography Version 1.0, September 2000 accessed from http://www.secg.org/download/aid-385/ secl_final.pdf
  • 16
    • 9144256251 scopus 로고    scopus 로고
    • A. Dabholkar and K.C. Yow, Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs), Wireless Personal Communications, 29, issue 3-4, pp. 233-246, Kluwer Academic Publishers, June 2004.
    • A. Dabholkar and K.C. Yow, "Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs)", Wireless Personal Communications, Vol. 29, issue 3-4, pp. 233-246, Kluwer Academic Publishers, June 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.