2018
DOI: 10.1007/s11277-017-5157-4
|View full text |Cite
|
Sign up to set email alerts
|

Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient Operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…m-BAT, a mobile app tool based on advanced ECC cryptosystem proposed for banking that run in a client-server environment, which connect users with the bank server via a customer portal able to run on the user's mobile phone in [25,5]. Many elliptic curve cryptographies (ECC)-based communication scheme has been developed for establishing a secure session key between IoT devices and a remote server in [18,31,24]. A protocol for key agreement based on hexadecimal enhanced ASCII Elliptic Curve Cryptography (ECC), authenticated by both parties is proposed which is pairingfree.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…m-BAT, a mobile app tool based on advanced ECC cryptosystem proposed for banking that run in a client-server environment, which connect users with the bank server via a customer portal able to run on the user's mobile phone in [25,5]. Many elliptic curve cryptographies (ECC)-based communication scheme has been developed for establishing a secure session key between IoT devices and a remote server in [18,31,24]. A protocol for key agreement based on hexadecimal enhanced ASCII Elliptic Curve Cryptography (ECC), authenticated by both parties is proposed which is pairingfree.…”
Section: Related Workmentioning
confidence: 99%
“…To prevent attacks from clone sensors in WSN and MWSN, the author examined an ECC property outlined into a fully earmarked IECC protocol. IECC mechanism is an efficient surveillance in terms of risk assessment, which emphasis on securing an industrial estate [31]. In [11] the author focused deficiencies in security there in previous algorithms and proposed an efficient RFID authentication method using Elliptic Curve Cryptography (ECC).…”
Section: Related Workmentioning
confidence: 99%
“…Elliptic Curve Cryptography is one of the lightweight cryptography algorithms since it requires low power for key generation. In [30] authors proposed inclusive ECC security protocol for mitigating security attacks in WSN. Firstly a secure ECC clustering algorithm was considered in a hierarchy structure.…”
Section: Lightweight Cryptography In Wsnmentioning
confidence: 99%
“…A familiarly known graph type is graph 500, developed by the HPC community [9]. Social application information was developed in the social graph with the benchmark developed, and the general information regarding the graphing model was also provided [10,28].…”
Section: Literature Surveymentioning
confidence: 99%
“…How many sites did you use? The TPC-DS Benchmark ( [27,28]) covers benchmark components that are used to make a comprehensive series of materials as well as start-up methods in a robust as well as a straightforward, neutral way for the trader. The benchmark is placed in a typical business environment to reduce the learning curve for new bank users and sponsors in the TPC-DS.…”
Section: Proposed Systemmentioning
confidence: 99%