ECCPWS: An ECC-based protocol for WBAN systems

F Pirmoradian, M Safkhani, SM Dakhilalian - Computer Networks, 2023 - Elsevier
Abstract The development of Wireless Body Area Network (WBAN) and Wearable Health
Monitoring Systems (WHMS) play a key role in healthcare monitoring. WBAN includes …

Method and apparatus for transmitting data using authentication

Y You, SS Kim, C Kwon - US Patent 8,078,874, 2011 - Google Patents
A method and apparatus of transmitting data using authentication between a first device and
a second device are provided. The method includes transmitting an encrypted certificate of …

Elliptic curve cryptography: Current status and research challenges

S Kalra, SK Sood - … Conference on High Performance Architecture and …, 2011 - Springer
Three types of standard public-key cryptographic systems that can be considered secure,
efficient, and commercially practical are (i) Integer Factorization Systems (eg RSA)(ii) …

Secure key management in multimedia communication system

GS Sundaram, V Cakulev - US Patent 8,850,203, 2014 - Google Patents
Principles of the invention provide one or more secure key management protocols for use in
communication environ ments such as a media plane of a multimedia communication …

Elliptic curve cryptography: survey and its security applications

S Kalra, SK Sood - Proceedings of the international conference on …, 2011 - dl.acm.org
Elliptic curve cryptosystems are based on ECDLP (Elliptic curve discrete logarithm problem)
for their security. The best known method to solve ECDLP (pollard's rho algorithm) is fully …

[PDF][PDF] Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices.

K Chatterjee, A De, D Gupta - Int. J. Netw. Secur., 2013 - ijns.jalaxy.com.tw
Abstract Hyperelliptic Curve Cryptosystem (HECC) is well suited for secure communication
in wireless sensor network as limited resources (storage, time or power) on sensor nodes …

Secure access of smart cards using elliptic curve cryptosystems

K Chatterjee, D Gupta - 2009 5th International Conference on …, 2009 - ieeexplore.ieee.org
Public Key Cryptography (PKC) is recently playing an essential role in electronic banking
and financial transactions. Elliptic Curve Cryptography (ECC) is one of the best public key …

Pairing-based cryptography

A Riyal, G Kumar, DK Sharma - Functional Encryption, 2021 - Springer
Following the patterns of the modern world, it is justifiable to say that Data is one of the most
valuable assets today. This change in perspective has resulted in a usefulness and …

Identity based authenticated key agreement protocol

GS Sundaram - US Patent 9,106,410, 2015 - Google Patents
BACKGROUND Cryptography is a well-known technique for providing secure
communication between two or more parties. Authen ticated Key Agreement is a …

MonValley: an unified monitoring and management framework for cloud services

X Zhao, J Yin, C Zhi, Z Chen - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Monitoring is the cornerstone for cloud service management, so it is significant for a cloud
monitoring tool to support customization for specific monitoring requirements, to indicate the …