|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 4 occurrences of 4 keywords
|
|
|
Results
Found 9 publication records. Showing 9 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
65 | Nigel P. Smart |
The Exact Security of ECIES in the Generic Group Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings, pp. 73-84, 2001, Springer, 3-540-43026-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Gianluigi Me, Maurizio Adriano Strangio, Alexander Schuster |
Mobile Local Macropayments: Security and Prototyping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 5(4), pp. 94-100, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
personal trusted device, ECIES, security, Java, handheld, payment |
36 | Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad 0003, Ahmad Baheej Al-Khalil, Penatiyana W. C. Prasad, Sabih ur Rehman, Rafiqul Islam 0002 |
Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(3), pp. 77, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
36 | Mahdi Shariatzadeh, Mahdi Eftekhari, Mohammad Javad Rostami 0001 |
A New Scheme for Image Compression and Encryption Using ECIES, Henon Map, and AEGAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.07635, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
36 | Paulo Realpe-Muñoz, Jaime Velasco-Medina, Guillermo Adolfo-David |
Design of an S-ECIES Cryptoprocessor Using Gaussian Normal Bases Over GF(2m). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 29(4), pp. 657-666, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
36 | |
A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 516, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
36 | Vui Huang Tea |
5G Subscription Concealed Identifier (SUCI) of IMSI-based Subscription Permanent Identifier (SUPI), privacy protected with ECIES Profile A protection scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
DOI RDF |
|
36 | Victor Gayoso Martínez, Fernando Hernández Álvarez, Luis Hernández Encinas, Carmen Sánchez Ávila |
A comparison of the standardized versions of ECIES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010, pp. 1-4, 2010, IEEE, 978-1-4244-7407-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
30 | Miguel Morales-Sandoval, Claudia Feregrino Uribe |
A Hardware Architecture for Elliptic Curve Cryptography and Lossless Data Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONIELECOMP ![In: 15th International Conference on Electronics, Communications, and Computers (CONIELECOMP 2005), 28 February 2005 - 2 March 2005, Puebla, Mexico, pp. 113-118, 2005, IEEE Computer Society, 0-7695-2283-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #9 of 9 (100 per page; Change: )
|
|