ECCPWS: An ECC-based protocol for WBAN systems
F Pirmoradian, M Safkhani, SM Dakhilalian - Computer Networks, 2023 - Elsevier
Abstract The development of Wireless Body Area Network (WBAN) and Wearable Health
Monitoring Systems (WHMS) play a key role in healthcare monitoring. WBAN includes …
Monitoring Systems (WHMS) play a key role in healthcare monitoring. WBAN includes …
Method and apparatus for transmitting data using authentication
Y You, SS Kim, C Kwon - US Patent 8,078,874, 2011 - Google Patents
A method and apparatus of transmitting data using authentication between a first device and
a second device are provided. The method includes transmitting an encrypted certificate of …
a second device are provided. The method includes transmitting an encrypted certificate of …
Elliptic curve cryptography: Current status and research challenges
Three types of standard public-key cryptographic systems that can be considered secure,
efficient, and commercially practical are (i) Integer Factorization Systems (eg RSA)(ii) …
efficient, and commercially practical are (i) Integer Factorization Systems (eg RSA)(ii) …
Secure key management in multimedia communication system
GS Sundaram, V Cakulev - US Patent 8,850,203, 2014 - Google Patents
Principles of the invention provide one or more secure key management protocols for use in
communication environ ments such as a media plane of a multimedia communication …
communication environ ments such as a media plane of a multimedia communication …
Elliptic curve cryptography: survey and its security applications
Elliptic curve cryptosystems are based on ECDLP (Elliptic curve discrete logarithm problem)
for their security. The best known method to solve ECDLP (pollard's rho algorithm) is fully …
for their security. The best known method to solve ECDLP (pollard's rho algorithm) is fully …
[PDF][PDF] Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices.
Abstract Hyperelliptic Curve Cryptosystem (HECC) is well suited for secure communication
in wireless sensor network as limited resources (storage, time or power) on sensor nodes …
in wireless sensor network as limited resources (storage, time or power) on sensor nodes …
Secure access of smart cards using elliptic curve cryptosystems
K Chatterjee, D Gupta - 2009 5th International Conference on …, 2009 - ieeexplore.ieee.org
Public Key Cryptography (PKC) is recently playing an essential role in electronic banking
and financial transactions. Elliptic Curve Cryptography (ECC) is one of the best public key …
and financial transactions. Elliptic Curve Cryptography (ECC) is one of the best public key …
Identity based authenticated key agreement protocol
GS Sundaram - US Patent 9,106,410, 2015 - Google Patents
BACKGROUND Cryptography is a well-known technique for providing secure
communication between two or more parties. Authen ticated Key Agreement is a …
communication between two or more parties. Authen ticated Key Agreement is a …
MonValley: an unified monitoring and management framework for cloud services
Monitoring is the cornerstone for cloud service management, so it is significant for a cloud
monitoring tool to support customization for specific monitoring requirements, to indicate the …
monitoring tool to support customization for specific monitoring requirements, to indicate the …