Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
(Articles)
Sankita J. Patel
,
Ankit Chouhan
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 17, 2014
DOI:
10.4236/jis.2014.51002
5,380
Downloads
9,072
Views
Citations
Private Personal Information Verification
(Articles)
Hoang Giang Do
,
Wee Keong Ng
Journal of Information Security
Vol.8 No.3
,July 18, 2017
DOI:
10.4236/jis.2017.83015
1,155
Downloads
3,327
Views
Citations
Security and Privacy-Preserving Metering Service in the Smart Grid
(Articles)
Zhongwei Sun
,
Chuqi Song
Int'l J. of Communications, Network and System Sciences
Vol.10 No.8B
,August 14, 2017
DOI:
10.4236/ijcns.2017.108B033
1,078
Downloads
2,329
Views
Citations
Secure Signature Protocol
(Articles)
Shundong LI
,
Daoshun WANG
,
Yiqi DAI
Intelligent Information Management
Vol.1 No.3
,December 29, 2009
DOI:
10.4236/iim.2009.13026
5,322
Downloads
8,056
Views
Citations
An Algebraic Proof of the Associative Law of Elliptic Curves
(Articles)
Kazuyuki Fujii
,
Hiroshi Oike
Advances in Pure Mathematics
Vol.7 No.12
,December 12, 2017
DOI:
10.4236/apm.2017.712040
2,588
Downloads
5,192
Views
Citations
Construction and Implementation of a Privacy-Preserving Identity-Based Encryption Architecture
(Articles)
David Bissessar
,
Carlisle Adams
Journal of Information Security
Vol.14 No.4
,August 31, 2023
DOI:
10.4236/jis.2023.144018
133
Downloads
602
Views
Citations
Security Implementation in WSN with Symmetric and Matrix Mapping on Asymmetric ECC Cryptographic Techniques
(Articles)
S. Hemalatha
,
V. Rajamani
,
V. Parthasarathy
Circuits and Systems
Vol.7 No.10
,August 23, 2016
DOI:
10.4236/cs.2016.710273
2,055
Downloads
3,239
Views
Citations
Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
(Articles)
J. Athena
,
V. Sumathy
Circuits and Systems
Vol.8 No.3
,March 31, 2017
DOI:
10.4236/cs.2017.83005
2,066
Downloads
4,538
Views
Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42009
4,250
Downloads
7,634
Views
Citations
On the Torsion Subgroups of Certain Elliptic Curves over Q
(Articles)
Yoon Kyung Park
Advances in Pure Mathematics
Vol.3 No.2
,March 19, 2013
DOI:
10.4236/apm.2013.32043
5,955
Downloads
8,888
Views
Citations
The Deutsch-Jozsa Algorithm Can Be Used for Quantum Key Distribution
(Articles)
Koji Nagata
,
Tadao Nakamura
Open Access Library Journal
Vol.2 No.8
,August 14, 2015
DOI:
10.4236/oalib.1101798
1,556
Downloads
2,576
Views
Citations
A Quantum Mechanical Proof of Insecurity of the Theoretical QKD Protocols
(Articles)
Jianzhong Zhao
Journal of Quantum Information Science
Vol.12 No.3
,August 30, 2022
DOI:
10.4236/jqis.2022.123006
138
Downloads
840
Views
Citations
Sensitive Information Security Based on Elliptic Curves
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
World Journal of Engineering and Technology
Vol.12 No.2
,April 23, 2024
DOI:
10.4236/wjet.2024.122018
45
Downloads
151
Views
Citations
Privacy Preservation of Smart Meters Based on Identity Authentication
(Articles)
Hongbo Hu
,
Xin Zhao
,
Yalian Wu
,
Mengbiao Huang
,
Ziqi Zhu
,
Qingyu Yang
Energy and Power Engineering
Vol.12 No.4B
,April 10, 2020
DOI:
10.4236/epe.2020.124B006
485
Downloads
1,215
Views
Citations
AudiTEE: Efficient, General-Purpose and Privacy-Preserving Audit for Distributed Ledgers
(Articles)
Zhufeng Ye
,
Zhenghao Wu
,
Xianglan Tian
Journal of Computer and Communications
Vol.9 No.8
,August 31, 2021
DOI:
10.4236/jcc.2021.98007
231
Downloads
832
Views
Citations
Cryptographic Schemes Based on Elliptic Curves over the Ring Zp[i]
(Articles)
Manoj Kumar
,
Pratik Gupta
Applied Mathematics
Vol.7 No.3
,February 29, 2016
DOI:
10.4236/am.2016.73027
3,492
Downloads
5,011
Views
Citations
Anonymous Authentication for Secure Mobile Agent Based Internet Business
(Articles)
Sivaraman Audithan
,
Thanjavur Swaminathan Murunya
,
Pandi Vijayakumar
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78124
1,470
Downloads
2,314
Views
Citations
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography
(Articles)
Krishnan Kumar
,
J. Nafeesa Begum
,
V. Sumathy
Int'l J. of Communications, Network and System Sciences
Vol.3 No.4
,April 30, 2010
DOI:
10.4236/ijcns.2010.34047
5,181
Downloads
9,285
Views
Citations
Computation of Complex Primes Using Elliptic Curves: Application for Cryptosystem Design
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.5 No.1
,January 20, 2012
DOI:
10.4236/ijcns.2012.51001
3,706
Downloads
7,578
Views
Citations
An Extensive Study and Review of Privacy Preservation Models for the Multi-Institutional Data
(Articles)
Sagarkumar Patel
,
Rachna Patel
,
Ashok Akbari
,
Srinivasa Reddy Mukkala
Journal of Information Security
Vol.14 No.4
,October 10, 2023
DOI:
10.4236/jis.2023.144020
98
Downloads
395
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top