2019
DOI: 10.11591/ijece.v9i4.pp3228-3231
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless and provably-secure digital signature scheme based on elliptic curve

Abstract: With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…This method is also a development of the Multilayer Perceptron (MLP) (Rustam, Yuda, Alatas, & Aroef, 2020). To use this method, the author will use 2 data, the first data is training data which will be used as a reference in the classification process and the second data is testing data which will be used as research sample data and is also data that will be classified in data mining (Baker, Mohammed, & Aldabagh, 2020) (Toradmalle, Muthukuru, & Sathyanarayana, 2019) (Aguni, Chabaa, Ibnyaich, & Zeroual, 2021).…”
Section: Methodsmentioning
confidence: 99%
“…This method is also a development of the Multilayer Perceptron (MLP) (Rustam, Yuda, Alatas, & Aroef, 2020). To use this method, the author will use 2 data, the first data is training data which will be used as a reference in the classification process and the second data is testing data which will be used as research sample data and is also data that will be classified in data mining (Baker, Mohammed, & Aldabagh, 2020) (Toradmalle, Muthukuru, & Sathyanarayana, 2019) (Aguni, Chabaa, Ibnyaich, & Zeroual, 2021).…”
Section: Methodsmentioning
confidence: 99%
“…The sensing operation was properly interfaced, and it was able to function and produce the desired outcomes as shown in Figure 2. The temperature, carbon monoxide, smoke, and fire flame were all detected and also, these fire parameters were successfully transmitted to the data processing unit through the use of sending operation which is interfaced with the WiFi module [13] [14].…”
Section: Sensing and Monitoring Unitmentioning
confidence: 99%
“…Also, it manages a manual call point or fire alarm to warn the people present in the building, factory, or home. The smart fire detection system is generally equipped with sprinkles that automatically turn on in the presence of fire to cure against small-scale fire but for largescale fire, we required an immediate fire brigade service [3]. The existing smart fire detection system based on the centralized architecture informs the fire department but does not ensure the arrival of the fire brigade [4].…”
Section: Introductionmentioning
confidence: 99%