Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography
(Articles)
Krishnan Kumar
,
J. Nafeesa Begum
,
V. Sumathy
International Journal of Communications, Network and System Sciences
Vol.3 No.4
, April 30, 2010
DOI:
10.4236/ijcns.2010.34047
5,522
Downloads
9,974
Views
Citations
Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
(Articles)
J. Athena
,
V. Sumathy
Circuits and Systems
Vol.8 No.3
, March 31, 2017
DOI:
10.4236/cs.2017.83005
2,314
Downloads
5,517
Views
Citations
TUP: A New eCK-Secure AKE Protocol under the CDH Assumption
(Articles)
Qinglei Zhou
,
Zengfu Yang
International Journal of Communications, Network and System Sciences
Vol.5 No.6
, June 12, 2012
DOI:
10.4236/ijcns.2012.56043
3,648
Downloads
6,445
Views
Citations
A Fair Electronic Cash System with Identity-Based Group Signature Scheme
(Articles)
Khalid. O. Elaalim
,
Shoubao Yang
Journal of Information Security
Vol.3 No.2
, April 26, 2012
DOI:
10.4236/jis.2012.32021
4,443
Downloads
8,106
Views
Citations
On the Torsion Subgroups of Certain Elliptic Curves over Q
(Articles)
Yoon Kyung Park
Advances in Pure Mathematics
Vol.3 No.2
, March 19, 2013
DOI:
10.4236/apm.2013.32043
6,420
Downloads
9,816
Views
Citations
Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design
(Articles)
Boris Verkhovsky
International Journal of Communications, Network and System Sciences
Vol.5 No.11
, November 26, 2012
DOI:
10.4236/ijcns.2012.511074
4,590
Downloads
6,900
Views
Citations
Faster Method for Secure Transmission of Information with Sender Identification
(Articles)
Boris Verkhovsky
International Journal of Communications, Network and System Sciences
Vol.6 No.2
, February 26, 2013
DOI:
10.4236/ijcns.2013.62009
4,064
Downloads
6,256
Views
Citations
Construction and Implementation of a Privacy-Preserving Identity-Based Encryption Architecture
(Articles)
David Bissessar
,
Carlisle Adams
Journal of Information Security
Vol.14 No.4
, August 31, 2023
DOI:
10.4236/jis.2023.144018
292
Downloads
1,212
Views
Citations
An Algebraic Proof of the Associative Law of Elliptic Curves
(Articles)
Kazuyuki Fujii
,
Hiroshi Oike
Advances in Pure Mathematics
Vol.7 No.12
, December 12, 2017
DOI:
10.4236/apm.2017.712040
2,833
Downloads
6,385
Views
Citations
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
(Articles)
Sankita J. Patel
,
Ankit Chouhan
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
, January 17, 2014
DOI:
10.4236/jis.2014.51002
5,773
Downloads
9,980
Views
Citations
Cryptographic Schemes Based on Elliptic Curves over the Ring Zp[i]
(Articles)
Manoj Kumar
,
Pratik Gupta
Applied Mathematics
Vol.7 No.3
, February 29, 2016
DOI:
10.4236/am.2016.73027
3,686
Downloads
5,711
Views
Citations
Anonymous Authentication for Secure Mobile Agent Based Internet Business
(Articles)
Sivaraman Audithan
,
Thanjavur Swaminathan Murunya
,
Pandi Vijayakumar
Circuits and Systems
Vol.7 No.8
, June 9, 2016
DOI:
10.4236/cs.2016.78124
1,660
Downloads
2,890
Views
Citations
Security and Privacy-Preserving Metering Service in the Smart Grid
(Articles)
Zhongwei Sun
,
Chuqi Song
International Journal of Communications, Network and System Sciences
Vol.10 No.8B
, August 14, 2017
DOI:
10.4236/ijcns.2017.108B033
1,258
Downloads
2,967
Views
Citations
Computation of Complex Primes Using Elliptic Curves: Application for Cryptosystem Design
(Articles)
Boris S. Verkhovsky
International Journal of Communications, Network and System Sciences
Vol.5 No.1
, January 20, 2012
DOI:
10.4236/ijcns.2012.51001
3,894
Downloads
8,085
Views
Citations
On Elliptic Curves with Everywhere Good Reduction over Certain Number Fields
(Articles)
Shun’ichi Yokoyama
American Journal of Computational Mathematics
Vol.2 No.4
, December 31, 2012
DOI:
10.4236/ajcm.2012.24049
3,719
Downloads
6,941
Views
Citations
A Note on the Lie Algebra of the Invariants in the CBS Nonlinear Equation
(Articles)
Jose M. Cerveró
Journal of Modern Physics
Vol.9 No.6
, May 25, 2018
DOI:
10.4236/jmp.2018.96078
764
Downloads
1,583
Views
Citations
This article belongs to the Special Issue on
Symmetry and Relativity Research
Besov Estimates for Sub-Elliptic Equations in the Heisenberg Group
(Articles)
Huimin Cheng
,
Feng Zhou
Advances in Pure Mathematics
Vol.14 No.9
, September 13, 2024
DOI:
10.4236/apm.2024.149039
107
Downloads
528
Views
Citations
Security Implementation in WSN with Symmetric and Matrix Mapping on Asymmetric ECC Cryptographic Techniques
(Articles)
S. Hemalatha
,
V. Rajamani
,
V. Parthasarathy
Circuits and Systems
Vol.7 No.10
, August 23, 2016
DOI:
10.4236/cs.2016.710273
2,237
Downloads
3,804
Views
Citations
The Technique of the Immersed Boundary Method: Application to Solving Shape Optimization Problem
(Articles)
Ling Rao
,
Hongquan Chen
Journal of Applied Mathematics and Physics
Vol.5 No.2
, February 15, 2017
DOI:
10.4236/jamp.2017.52030
1,484
Downloads
2,811
Views
Citations
The Development of Electronic Signature Processes in Türkiye and an Analysis of the Requirements for the Transition to Elliptic Curve Cryptography (ECC)
(Articles)
Mutlu Uysal
,
Nursel Yalçın
Journal of Computer and Communications
Vol.14 No.3
, March 5, 2026
DOI:
10.4236/jcc.2026.143002
46
Downloads
292
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top