메뉴 건너뛰기




Volumn , Issue , 2009, Pages 474-479

An efficient mobile voting system security scheme based on elliptic curve cryptography

Author keywords

Cryptography; ECC; Mobile voting; Security

Indexed keywords

ASYMMETRIC ALGORITHMS; CRYPTOGRAPHIC SCHEMES; E-VOTING; ECC; ELECTRONIC VOTING SYSTEMS; ELLIPTIC CURVE CRYPTOGRAPHY; HOMOMORPHIC-ENCRYPTIONS; KEY SIZES; ON-BOARD RESOURCES; SECURITY STRENGTHS; SYMMETRIC ENCRYPTION; VOTING SCHEMES; VOTING SECURITY; VOTING SYSTEMS;

EID: 72849117130     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2009.57     Document Type: Conference Paper
Times cited : (28)

References (26)
  • 2
  • 7
    • 77953904148 scopus 로고    scopus 로고
    • NIST Special Publication 800-57: Recommendation for Key Management - Part 1: General (Revised)
    • NIST
    • E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "NIST Special Publication 800-57: Recommendation for Key Management - Part 1: General (Revised)," NIST, Ed.: NIST, 2007.
    • (2007) NIST, Ed
    • Barker, E.1    Barker, W.2    Burr, W.3    Polk, W.4    Smid, M.5
  • 13
  • 14
    • 77953567600 scopus 로고    scopus 로고
    • A workload characterization of elliptic curve cryptography methods in embedded environments
    • I. Branovic, R. Giorgi, and E. Martinelli, "A workload characterization of elliptic curve cryptography methods in embedded environments," ACM SIGARCH Computer Architecture News, vol. 32, pp. 27-34, 2004.
    • (2004) ACM SIGARCH Computer Architecture News , vol.32 , pp. 27-34
    • Branovic, I.1    Giorgi, R.2    Martinelli, E.3
  • 20
    • 72849145135 scopus 로고    scopus 로고
    • Lightweight API
    • on-line] accessed on March 15, from http://, The Legion of the Bouncy Castle
    • Bouncy Castle, "Lightweight API," [on-line] accessed on March 15, 2009 from http://www.bouncycastle.org/, The Legion of the Bouncy Castle, 2008.
    • (2008)
  • 22
    • 72849137846 scopus 로고    scopus 로고
    • on-line] accessed on April 15, 2009 from, Computer Security Division, National Institute of Standards and Technology NIST
    • NIST, "Advanced Encryption Standard Algorithm Validation List," [on-line] accessed on April 15, 2009 from http://csrc.nist.gov/, Computer Security Division, National Institute of Standards and Technology (NIST), 2009.
    • (2009) Advanced Encryption Standard Algorithm Validation List
  • 26
    • 51249099350 scopus 로고    scopus 로고
    • A k-nearest neighbor approach for user authentication through biometric keystroke dynamics
    • Beijing, China, 19-23 May
    • J. Hu, D. Gingrich A. Sentosa, "A k-nearest neighbor approach for user authentication through biometric keystroke dynamics," Proc. IEEE ICC Conference, Beijing, China, 19-23 May, 2008.
    • (2008) Proc. IEEE ICC Conference
    • Hu, J.1    Gingrich, D.2    Sentosa, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.