-
1
-
-
85089844954
-
A 5G cognitive system for healthcare
-
M. Chen, J. Yang, Y. Hao, S. Mao, and K. Hwang, ''A 5G cognitive system for healthcare, '' Big Data Cognit. Comput., vol. 1, no. 1, p. 2, 2017, doi: 10.3390/.bdcc1010002.
-
(2017)
Big Data Cognit. Comput
, vol.1
, Issue.1
, pp. 2
-
-
Chen, M.1
Yang, J.2
Hao, Y.3
Mao, S.4
Hwang, K.5
-
3
-
-
84898796363
-
Big data: A survey
-
Apr
-
M. Chen, S. Mao, and Y. Liu, ''Big data: A survey, '' Mobile Netw. Appl., vol. 19, no. 2, pp. 171-209, Apr. 2014.
-
(2014)
Mobile Netw. Appl
, vol.19
, Issue.2
, pp. 171-209
-
-
Chen, M.1
Mao, S.2
Liu, Y.3
-
4
-
-
85011023303
-
Healthcare big data voice pathol-ogy assessment framework
-
Dec
-
M. S. Hossain and G. Muhammad, ''Healthcare big data voice pathol-ogy assessment framework, '' IEEE Access, vol. 4, no. 1, pp. 7806-7815, Dec. 2016.
-
(2016)
IEEE Access
, vol.4
, Issue.1
, pp. 7806-7815
-
-
Hossain, M.S.1
Muhammad, G.2
-
5
-
-
85023602966
-
Disease prediction by machine learning over big data from healthcare communities
-
M. Chen, Y. Hao, K. Hwang, L. Wang, and L. Wang, ''Disease prediction by machine learning over big data from healthcare communities, '' IEEE Access, vol. 5, no. 1, pp. 8869-8879, 2017.
-
(2017)
IEEE Access
, vol.5
, Issue.1
, pp. 8869-8879
-
-
Chen, M.1
Hao, Y.2
Hwang, K.3
Wang, L.4
Wang, L.5
-
6
-
-
85018484036
-
Emotion communication system
-
M. Chen, P. Zhou, and G. Fortino, ''Emotion communication system, '' IEEE Access, vol. 5, pp. 326-337, 2017.
-
IEEE Access
, vol.5
, Issue.2017
, pp. 326-337
-
-
Chen, M.1
Zhou, P.2
Fortino, G.3
-
7
-
-
85010005135
-
Wearable 2.0: Enabling human-cloud integration in next genera-Tion healthcare systems
-
Jan.
-
M. Chen, Y. Ma, Y. Li, D. Wu, Y. Zhang, and C.-H. Youn, ''Wearable 2.0: Enabling human-cloud integration in next genera-Tion healthcare systems, '' IEEE Commun., vol. 55, no. 1, pp. 54-61, Jan. 2017.
-
(2017)
IEEE Commun
, vol.55
, Issue.1
, pp. 54-61
-
-
Chen, M.1
Ma, Y.2
Li, Y.3
Wu, D.4
Zhang, Y.5
Youn, C.-H.6
-
8
-
-
84870431352
-
Towards large-scale twitter mining for drug-related adverse events
-
J. Bian, U. Topaloglu, and F. Yu, ''Towards large-scale twitter mining for drug-related adverse events, '' in Proc. SHB, Maui, HI, USA, 2012, pp. 25-32.
-
(2012)
Proc. SHB, Maui, HI, USA
, pp. 25-32
-
-
Bian, J.1
Topaloglu, U.2
Yu, F.3
-
9
-
-
84977743996
-
Cloud-Assisted industrial Internet of Things (IIoT)-Enabled framework for health monitoring
-
Jun
-
M. S. Hossain and G. Muhammad, ''Cloud-Assisted industrial Internet of Things (IIoT)-Enabled framework for health monitoring, '' Comput. Netw., vol. 101 pp. 192-202, Jun. 2016.
-
(2016)
Comput. Netw
, vol.101
, pp. 192-202
-
-
Hossain, M.S.1
Muhammad, G.2
-
10
-
-
84983015462
-
An overview of health analytics
-
W. Raghupathi and V. Raghupathi, ''An overview of health analytics, '' J. Health Med. Informat., vol. 4, no. 3, pp. 1-11, 2013.
-
(2013)
J. Health Med. Informat
, vol.4
, Issue.3
, pp. 1-11
-
-
Raghupathi, W.1
Raghupathi, V.2
-
11
-
-
85012115904
-
Toward end-To-end biomet rics-based security for IoT infrastructure
-
Oct
-
M. S. Hossain, G. Muhammad, S. M. M. Rahman, W. Abdul, A. Alelaiwi, and A. Alamri, ''Toward end-To-end biomet rics-based security for IoT infrastructure, '' IEEE Wireless Commun. Mag., vol. 23, no. 5, pp. 45-51, Oct. 2016.
-
(2016)
IEEE Wireless Commun. Mag
, vol.23
, Issue.5
, pp. 45-51
-
-
Hossain, M.S.1
Muhammad, G.2
Rahman, S.M.M.3
Abdul, W.4
Alelaiwi, A.5
Alamri, A.6
-
12
-
-
62949225623
-
Cloud computing and grid com-puting 360-degree compared
-
Nov
-
I. Foster, Y. Zhao, I. Raicu, and S. Lu, ''Cloud computing and grid com-puting 360-degree compared, '' in Proc. Grid Comput. Environ. Workshop, Austin, TX, USA, Nov. 2008, pp. 1-10.
-
(2008)
Proc. Grid Comput. Environ. Workshop, Austin, TX, USA
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
14
-
-
85038243045
-
A review on issues and chal-lenges of cloud computing
-
D. Sangita, C. Ankita, and P. Reshamlal, ''A review on issues and chal-lenges of cloud computing, '' Int. J. Innov. Adv. Comput. Sci., vol. 4, no. 1, pp. 81-88, 2015.
-
(2015)
Int. J. Innov. Adv. Comput. Sci
, vol.4
, Issue.1
, pp. 81-88
-
-
Sangita, D.1
Ankita, C.2
Reshamlal, P.3
-
15
-
-
84959516414
-
-
Pacific Nortwest Nat. Lab., Washington, DC, USA, Tech. Rep. PNNL-21724 Sep
-
B. A. Akyol, ''Cyber security challenges in using cloud computing in the electric utility industry, '' Pacific Nortwest Nat. Lab., Washington, DC, USA, Tech. Rep. PNNL-21724, Sep. 2012.
-
(2012)
Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry
-
-
Akyol, B.A.1
-
16
-
-
78650558794
-
Secure virtualization for cloud computing
-
F. Lombardi and R. Di Pietro, ''Secure virtualization for cloud computing, '' J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1113-1122, 2010.
-
(2010)
J. Netw. Comput. Appl
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Di Pietro, R.2
-
18
-
-
85038234411
-
Survey on insider data theft misuse attacks in the cloud
-
D. Kumar and K. Morarjee, ''Survey on insider data theft misuse attacks in the cloud, '' Int. J. Comput. Sci. Mobile Appl., vol. 2, no. 2, pp. 26-29, 2014.
-
(2014)
Int. J. Comput. Sci. Mobile Appl
, vol.2
, Issue.2
, pp. 26-29
-
-
Kumar, D.1
Morarjee, K.2
-
19
-
-
84905989927
-
Extending the cloud with fog: Security challenges and opportunities
-
J Shropshire, ''Extending the cloud with fog: Security challenges and opportunities, '' in Proc. 20th Amer. Conf. Inf. Syst., Savannah, Georgia, 2014, pp. 1-10.
-
(2014)
Proc. 20th Amer. Conf. Inf. Syst., Savannah, Georgia
, pp. 1-10
-
-
Shropshire, J.1
-
20
-
-
84975041891
-
Fog computing providing data security: A review
-
M. Kaur and M. Bharti, ''Fog computing providing data security: A review, '' Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 1, pp. 832-834, 2014.
-
(2014)
Int. J. Adv. Res. Comput. Sci. Softw. Eng
, vol.4
, Issue.1
, pp. 832-834
-
-
Kaur, M.1
Bharti, M.2
-
21
-
-
84907935855
-
-
Dept. Comput. Sci. Columbia Univ. Acad. Commons New York NY USA Tech. Rep
-
J. Voris, J. Jill, A. Keromytis, and S. Stolfo, ''Bait and snitch: Defending computer systems with decoys, '' Dept. Comput. Sci., Columbia Univ. Acad. Commons, New York, NY, USA, Tech. Rep., 2013. [Online]. Avail-Able: https://doi.org/10.7916/D8RN3H9S
-
(2013)
Bait and Snitch: Defending Computer Systems with Decoys
-
-
Voris, J.1
Jill, J.2
Keromytis, A.3
Stolfo, S.4
-
22
-
-
84864275237
-
Fog computing: Mitigat-ing insider data theft attacks in the cloud
-
May
-
S. J. Stolfo, M. B. Salem, and A. D. Keromytis, ''Fog computing: Mitigat-ing insider data theft attacks in the cloud, '' in Proc. IEEE CS Secur. Privacy Workshops, May 2012, pp. 125-128.
-
(2012)
Proc IEEE CS Secur. Privacy Workshops
, pp. 125-128
-
-
Stolfo, S.J.1
Salem, M.B.2
Keromytis, A.D.3
-
23
-
-
85038227121
-
A secure framework for mollifying attacks in cloud
-
B. R. Singh, S. Sunanda, and Y. Moligi Sangeetha Lakshmi Kanth, ''A secure framework for mollifying attacks in cloud, '' Int. J. Comput. Trends Technol., vol. 16, pp. 204-207, 2014.
-
(2014)
Int. J. Comput. Trends Technol
, vol.16
, pp. 204-207
-
-
Singh, B.R.1
Sunanda, S.2
Moligi, S.L.K.Y.3
-
24
-
-
85038217879
-
Perspective of decoy technique using mobile fog computing with effect to wireless environment
-
S. P. Karekar and S. M. Vaidya, ''Perspective of decoy technique using mobile fog computing with effect to wireless environment, '' Int. J. Sci. Eng. Technol. Res., vol. 4, no. 14, pp. 2620-2626, 2015.
-
(2015)
Int. J. Sci. Eng. Technol. Res
, vol.4
, Issue.14
, pp. 2620-2626
-
-
Karekar, S.P.1
Vaidya, S.M.2
-
25
-
-
84940284783
-
A review on modern distributed computing paradigm: Cloud computing, jungle computing and fog computing
-
M. Hajibaba and S. Gorgin, ''A review on modern distributed computing paradigm: Cloud computing, jungle computing and fog computing, '' J. Comput. Inf. Technol., vol. 22, no. 2, pp. 69-84, 2014.
-
(2014)
J. Comput. Inf. Technol
, vol.22
, Issue.2
, pp. 69-84
-
-
Hajibaba, M.1
Gorgin, S.2
-
26
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, ''Fog computing and its role in the Internet of Things, '' in Proc. 1st Ed. MCC Workshop Mobile Cloud Comput., 2012, pp. 13-16.
-
(2012)
Proc. 1st Ed. MCC Workshop Mobile Cloud Comput
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
27
-
-
77957230388
-
Private key agreement and secure communication for heterogeneous sensor networks
-
S. M. M. Rahman and K. El-Khatib, ''Private key agreement and secure communication for heterogeneous sensor networks, '' J. Parallel Distrib. Comput., vol. 70, no. 8, pp. 858-870, 2010.
-
(2010)
J. Parallel Distrib. Comput
, vol.70
, Issue.8
, pp. 858-870
-
-
Rahman, S.M.M.1
El-Khatib, K.2
-
28
-
-
84989950607
-
-
M.S.Thesis, Dept. Comput. Sci., Radboud Univ., Nijmegen, The Netherland
-
D. Meffert, ''Bilinear pairing in cryptography, '' M.S.Thesis, Dept. Comput. Sci., Radboud Univ., Nijmegen, The Netherland, 2009.
-
(2009)
Bilinear Pairing in Cryptography
-
-
Meffert, D.1
-
29
-
-
70350660123
-
An introduction to pairing-based cryptography
-
A. Menezes, ''An introduction to pairing-based cryptography, '' in Recent Trends in Cryptography. Providence, RI, USA: AMS, 2009, pp. 47-65.
-
(2009)
Recent Trends in Cryptography. Providence, RI, USA: AMS
, pp. 47-65
-
-
Menezes, A.1
-
30
-
-
84939519569
-
Report on pairing-based cryptography
-
Feb
-
D. Moody, R. Peralta, R. Perlner, A. Regenscheid, A. Roginsky, and L. Chen, ''Report on pairing-based cryptography, '' J. Res. Nat. Inst. Stan-dards Technol., vol. 120, pp. 11-27, Feb. 2015.
-
(2015)
J. Res. Nat. Inst. Stan-dards Technol
, vol.120
, pp. 11-27
-
-
Moody, D.1
Peralta, R.2
Perlner, R.3
Regenscheid, A.4
Roginsky, A.5
Chen, L.6
-
31
-
-
79952952264
-
Cloud hooks: Security and privacy issues in cloud com-puting
-
Jan
-
W. A. Jansen, ''Cloud hooks: Security and privacy issues in cloud com-puting, '' in Proc. HAWAII Int. Conf. Syst. Sci., Koloa, HI, USA, Jan. 2011, pp. 1-10.
-
(2011)
Proc. Hawaii Int. Conf. Syst. Sci., Koloa, HI, USA
, pp. 1-10
-
-
Jansen, W.A.1
-
32
-
-
85026397069
-
Effectiveness of iPhone's touch ID: KSA case study
-
A. A. Aldaraiseh, D. Alomari, H. Alhamid, N. Hamad, and R. Althemali, ''Effectiveness of iPhone's touch ID: KSA case study, '' Int. J. Adv. Comput. Sci., vol. 6, no. 1, pp. 154-161, 2015.
-
(2015)
Int. J. Adv. Comput. Sci
, vol.6
, Issue.1
, pp. 154-161
-
-
Aldaraiseh, A.A.1
Alomari, D.2
Alhamid, H.3
Hamad, N.4
Althemali, R.5
-
33
-
-
85038261538
-
Securing photos in the cloud using decoy photo gallery
-
Mar
-
H. A. Al-Hamid and S. M. M. Rahman, ''Securing photos in the cloud using decoy photo gallery, '' in Proc. Int. Conf. Wireless Commun., Signal Process. Netw. (WiSPNET), Chennai, India, Mar. 2017, pp. 65-1-65-7.
-
(2017)
Proc. Int. Conf. Wireless Commun., Signal Process. Netw. (WiSPNET), Chennai, India
, pp. 651-657
-
-
Al-Hamid, H.A.1
Rahman, S.M.M.2
-
34
-
-
84908608649
-
Mobile cloud com-puting: Security threats
-
Feb
-
S. S. Vikas, K. Gurudatt, K. Pawan, and G. Shyam, ''Mobile cloud com-puting: Security threats, '' in Proc. Int. Conf. Electron. Commun. Syst., Coimbatore, India, Feb. 2014, pp. 1-4.
-
(2014)
Proc. Int. Conf. Electron. Commun. Syst., Coimbatore, India
, pp. 1-4
-
-
Vikas, S.S.1
Gurudatt, K.2
Pawan, K.3
Shyam, G.4
-
35
-
-
85038219298
-
Securing the cloud using decoy information technology to preventing them from distinguishing the real sensitive data from fake worthless data
-
Sep
-
E. Aruna, C. Prasad, and M. A. Reddy, ''Securing the cloud using decoy information technology to preventing them from distinguishing the real sensitive data from fake worthless data, '' Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 3, pp. 292-299, Sep. 2013.
-
(2013)
Int. J. Adv. Res. Comput. Sci. Softw. Eng
, vol.3
, pp. 292-299
-
-
Aruna, E.1
Prasad, C.2
Reddy, M.A.3
-
36
-
-
85038250058
-
Secured cloud computing with decoy documents
-
D. Patil, S. Patil, D. Pote, and N. Koli, ''Secured cloud computing with decoy documents, '' Int. J. Adv. Comput. Sci. Cloud Comput., vol. 2, no. 2, pp. 43-45, 2014.
-
(2014)
Int. J. Adv. Comput. Sci. Cloud Comput
, vol.2
, Issue.2
, pp. 43-45
-
-
Patil, D.1
Patil, S.2
Pote, D.3
Koli, N.4
-
37
-
-
85038251583
-
Fog computing: A new concept to minimize the attacks and to provide security in cloud computing environment
-
S. Khairnar and D. Borkar, ''Fog computing: A new concept to minimize the attacks and to provide security in cloud computing environment, '' Int. J. Res. Eng. Technol., vol. 3, no. 6, pp. 124-127, 2014.
-
(2014)
Int. J. Res. Eng. Technol
, vol.3
, Issue.6
, pp. 124-127
-
-
Khairnar, S.1
Borkar, D.2
-
38
-
-
84923241703
-
A hybrid protocol to secure the cloud from insider threats
-
Oct
-
M. Sriram, V. Patel, D. Harishma, and N. Lakshmanan, ''A hybrid protocol to secure the cloud from insider threats, '' in Proc. IEEE Int. Conf. Cloud Comput. Emerg. Markets (CCEM), Bangalore, India, Oct. 2014, pp. 1-5.
-
(2014)
Proc IEEE Int. Conf. Cloud Comput. Emerg. Markets (CCEM), Bangalore, India
, pp. 1-5
-
-
Sriram, M.1
Patel, V.2
Harishma, D.3
Lakshmanan, N.4
-
39
-
-
85038247839
-
Hindering data theft attacks through fog computing
-
A. R. Vinod, B. S. Sunidatta, K. U. Rani, and P. P. Sasidharan, ''Hindering data theft attacks through fog computing, '' Int. J. Res. Eng. Technol., vol. 3, no. 9, pp. 427-429, 2014.
-
(2014)
Int. J. Res. Eng. Technol
, vol.3
, Issue.9
, pp. 427-429
-
-
Vinod, A.R.1
Sunidatta, B.S.2
Rani, K.U.3
Sasidharan, P.P.4
-
40
-
-
84861917864
-
Research on cloud computing security problem and strategy
-
Apr
-
W. Liu, ''Research on cloud computing security problem and strategy, '' in Proc. IEEE Conf., Yichang, China, Apr. 2012, pp. 1216-1219.
-
(2012)
Proc IEEE Conf., Yichang, China
, pp. 1216-1219
-
-
Liu, W.1
-
41
-
-
85038236651
-
User pro-ling-A short review
-
A. Cufoglu, ''User pro-ling-A short review, '' Int. J. Comput. Appl., vol. 108, no. 3, pp. 1-9, 2014.
-
(2014)
Int. J. Comput. Appl
, vol.108
, Issue.3
, pp. 1-9
-
-
Cufoglu, A.1
-
42
-
-
85038219925
-
A survey on image encryption and decryption using blowfish & watermarking
-
P. Gaur and N. Manglani, ''A survey on image encryption and decryption using blowfish & watermarking, '' Int. J. Recent Innov. Trend Comput. Commun., vol. 3, no. 5, pp. 3285-3288, 2015.
-
(2015)
Int. J. Recent Innov. Trend Comput. Commun
, vol.3
, Issue.5
, pp. 3285-3288
-
-
Gaur, P.1
Manglani, N.2
-
43
-
-
84942849840
-
Image encryption and decryption using blowfish algorithm in MATLAB
-
P. Singh, ''Image encryption and decryption using blowfish algorithm in MATLAB, '' Int. J. Sci. Eng. Res., vol. 4, no. 7, pp. 150-154, 2013.
-
(2013)
Int. J. Sci. Eng. Res
, vol.4
, Issue.7
, pp. 150-154
-
-
Singh, P.1
-
44
-
-
85038244915
-
-
M.S.Thesis, Dept. Math. Stat., Univ. San Diego, San Diego, CA, USA
-
H. B. Nguyen, ''An overview of the NTRU cryptographic system, '' M.S.Thesis, Dept. Math. Stat., Univ. San Diego, San Diego, CA, USA, 2014.
-
(2014)
An Overview of the NTRU Cryptographic System
-
-
Nguyen, H.B.1
-
45
-
-
85035135826
-
Design and development of combined algorithm computing technique to enhanceWeb security
-
H. Gohel, ''Design and development of combined algorithm computing technique to enhanceWeb security, '' Int. J. Innov. Emerg. Res. Eng., vol. 2, no. 1, pp. 76-79, 2015.
-
(2015)
Int. J. Innov. Emerg. Res. Eng
, vol.2
, Issue.1
, pp. 76-79
-
-
Gohel, H.1
-
46
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Berlin, Germany Springer
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz, ''Comparing elliptic curve cryptography and RSA on 8-bit CPUs, '' in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 3156. Berlin, Germany: Springer, 2004.
-
(2004)
Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)
, vol.3156
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
47
-
-
84945589982
-
A key agreement algorithm based on ECDSA for wireless sensor network
-
A. Singh, A. K. Awasthi, and K. Singh, ''A key agreement algorithm based on ECDSA for wireless sensor network, '' in Proc. 3rd Int. Conf. Adv. Comput. Netw. Inform., 2015, pp. 143-149.
-
(2015)
Proc. 3rd Int. Conf. Adv. Comput. Netw. Inform
, pp. 143-149
-
-
Singh, A.1
Awasthi, A.K.2
Singh, K.3
-
48
-
-
33750333415
-
-
Univ. Michigan College Eng., MI, USA, Tech. Rep Apr
-
N. Jansma and B. Arrendondo, ''Performance comparison of elliptic curve and rsa digital signatures, '' Univ. Michigan College Eng., MI, USA, Tech. Rep., Apr. 2004.
-
(2004)
Performance Comparison of Elliptic Curve and Rsa Digital Signatures
-
-
Jansma, N.1
Arrendondo, B.2
-
49
-
-
84934939483
-
Comparative analysis of symmetric key encryp-Tion algorithms
-
Aug
-
N. Tyagi and A. Ganpati, ''Comparative analysis of symmetric key encryp-Tion algorithms, '' Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 8, pp. 348-354, Aug. 2014.
-
(2014)
Int. J. Adv. Res. Comput. Sci. Softw. Eng
, vol.4
, Issue.8
, pp. 348-354
-
-
Tyagi, N.1
Ganpati, A.2
-
50
-
-
84880174298
-
DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis
-
Dec
-
N. Kumar and J. Thakur, ''DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis, '' Int. J. Emerg. Technol. Adv. Eng., vol. 1, no. 1, pp. 6-12, Dec. 2011.
-
(2011)
Int. J. Emerg. Technol. Adv. Eng
, vol.1
, Issue.1
, pp. 6-12
-
-
Kumar, N.1
Thakur, J.2
-
51
-
-
84904569239
-
Towards secure data exchange in peer-To-peer data man-Agement systems
-
S. M. M. Rahman, M. Masud, A. N. M. Noman, A. Alamri, and M. M. Hassan, ''Towards secure data exchange in peer-To-peer data man-Agement systems, '' Appl. Math. Inf. Sci., vol. 8, no. 6, pp. 2775-2787, 2014.
-
(2014)
Appl. Math. Inf. Sci
, vol.8
, Issue.6
, pp. 2775-2787
-
-
Rahman, S.M.M.1
Masud, M.2
Noman, A.N.M.3
Alamri, A.4
Hassan, M.M.5
-
52
-
-
33750710411
-
Implementing cryptographic pairing on smartcards
-
Berlin, Germany Springer
-
M. Scott, N. Costigan, andW. Abdulwahab, ''Implementing cryptographic pairing on smartcards, '' Cryptographic Hardware and Embedded Systems (Lecture Note in Computer Science). Berlin, Germany: Springer, 2006.
-
(2006)
Cryptographic Hardware and Embedded Systems (Lecture Note in Computer Science)
-
-
Scott, M.1
Costigan, N.2
Abdulwahab, W.3
-
53
-
-
84962453149
-
-
M.S.Thesis, Dept. Comput. Sci. Eng., Univ. Nat. Inst. Technol., Rourkela, India
-
B. Nayak, ''Signcryption schemes based on elliptic curve cryptography, '' M.S.Thesis, Dept. Comput. Sci. Eng., Univ. Nat. Inst. Technol., Rourkela, India, 2014.
-
(2014)
Signcryption Schemes Based on Elliptic Curve Cryptography
-
-
Nayak, B.1
|