Autors: Javed R. Shaikh., Nenova, M. V., Iliev, G. L., Valkova-Jarvis, Z. V.
Title: Analysis of Standard Elliptic Curves for the Implementation of Elliptic Curve Cryptography in Resource-Constrained E-commerce Applications
Keywords: E-commerce, ECC, ECDH, ECDSA, RSA, Safe Elliptic Curves

References

    Issue

    International Conference on Microwaves, Communications, Antennas and Electronic Systems (IEEE COMCAS 2017), Tel Aviv, Israel, 13-15 November 2017, pp. 1 – 4; EID: 2-s2.0-85045832527; Accession Number: WOS:000426968600119; ISBN: 978-1-5386-3169-0; ISSN: 2150-895X, 2017, Israel, DOI: 10.1109/COMCAS.2017. 8244805

    Цитирания (Citation/s):
    1. Andreea Ancuta Corici, Yatindra Shashi, Marius Corici, Ranjan Shrestha, David Guzman, Enabling Dynamic IoT Security Domains: Cellular Core Network and Device Management Meet Authentication Framework, 2019 Global IoT Summit (GIoTS), 17-21 June 2019, Aarhus, Denmark, INSPEC Accession Number: 18848722; DOI: 10.1109/GIOTS.2019.8766390, Publisher: IEEE - 2019 - в издания, индексирани в Scopus или Web of Science
    2. Yousra Berguig, Jalal Laassiri, Sanae Hanaoui, Salah-ddine Krit, Mobile Agent Security Based on Mutual Authentication and Elliptic Curve Cryptography, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8 Issue-12, pp. 2509-2517, October 2019, DOI: 10.35940/ijitee.L3438.1081219 - 2019 - в издания, индексирани в Scopus или Web of Science
    3. Dhimas Riksa Prathama, Prasetyo Adi Wibowo Putro, Dani Ilman Naviangga, Secure mobile payment based on elliptic curve cryptography, 2018 International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2018, Grand Zuri Malioboro HotelYogyakarta; Indonesia; 21 - 22 November 2018, Art. No. 8864488, pp. 140-145, ISBN: 978-153867422-2; DOI: 10.1109/ISRITI.2018.8864488 - 2018 - в издания, индексирани в Scopus или Web of Science
    4. Narander Kumar, Jitendra Kumar Samriya, EAAP: Efficient Authentication Agreement Protocol Policy for Cloud Environment, 4th International Conference on Next-Generation Computing Technologies, NGCT 2018, Dehradun, India, 21–22 November 2018, Revised Selected Papers, DOI: 10.1007/978-981-15-1718-1_26 - 2018 - в издания, индексирани в Scopus или Web of Science
    5. Sirka, S.Email, Erdelyi, J., Cicak, P., Jelemenska, K., Survey on Security Threats and Algorithms in Internet of Things Environment, ICETA 2019 - 17th IEEE International Conference on Emerging eLearning Technologies and Applications, 21-22 Nov. 2019, Article number 9039994, pp. 721-726; ISBN: 978-172814967-7; DOI: 10.1109/ICETA48886.2019.9039994 - 2019 - в издания, индексирани в Scopus или Web of Science
    6. Long, Y., Cheng, M., Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption, Proceedings - 2019 15th International Conference on Computational Intelligence and Security, CIS 2019, 13-16 Dec. 2019, pp. 252-256; ISBN: 978-172816092-4; DOI: 10.1109/CIS.2019.00060; Article number 9023728 - 2019 - в издания, индексирани в Scopus или Web of Science
    7. Inamdar, M.A., Kumaraswamy, H.V., Accurate Primary User Emulation Attack (PUEA) Detection in Cognitive Radio Network using KNN and ANN Classifier, Proceedings of the 4th International Conference on Trends in Electronics and Informatics, ICOEI 2020, pp. 490-495, ISBN: 978-172815518-0, DOI: 10.1109/ICOEI48184.2020.9143015, Article number 9143015, SCAD College of Engineering and Technology Tirunelveli; India; 15-17 June 2020 - 2020 - в издания, индексирани в Scopus или Web of Science
    8. Samir Abo-Taleb, A., Shalaby, M., Nabil, M., Elramly, S., A Side-Channel Attack Resistive ECDSA, Journal of Physics: Conference Series, Volume 1454, Issue 1, 23 March 2020, Article number 012003; DOI: 10.1088/1742-6596/1454/1/012003 - 2020 - в издания, индексирани в Scopus или Web of Science
    9. Gagneja, K., Kiefer, R., Security Protocol for Internet of Things (IoT): Blockchain-based Implementation and Analysis, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020, 22-23 Feb. 2020, Miami; United States; ISBN: 978-172815797-9, DOI: 10.1109/MobiSecServ48690.2020.9042948 - 2020 - в издания, индексирани в Scopus или Web of Science
    10. Gagneja, K., Kiefer, R., IoT Devices with Non-interactive Key Management Protocol, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020, 22-23 Feb. 2020, Miami; United States, Article number 9042942, ISBN: 978-172815797-9, DOI: 10.1109/MobiSecServ48690.2020.9042942 - 2020 - в издания, индексирани в Scopus или Web of Science
    11. Singh, S.R., Ajoy, K.K., Choosing a Suitable Public Cryptosystem for Internet of Tthings, Journal of Computational and Theoretical Nanoscience, Volume 17, Issue 1, 2020, Pages 402-408, ISSN: 15461955, DOI: 10.1166/jctn.2020.8682 - 2020 - в издания, индексирани в Scopus или Web of Science
    12. Cano, M.-D., Cañavate-Sanchez, A., Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA, Security and Communication Networks (Open Access), Volume 2020, 2020, Article number 4960964, ISSN: 19390114, DOI: 10.1155/2020/4960964 - 2020 - в издания, индексирани в Scopus или Web of Science
    13. Rebiha Hadaoui, Karim Tamine, Mehammed Daoui, Mustapha Lalam, Cryptosystem by a community of devices with limited resources, International Journal of Communication Networks and Distributed Systems, Volume 25, Issue 1, 2020, Pages 21-42, DOI: 10.1504/IJCNDS.2020.108148; ISSN: 1754-3916(Print), ISSN: 1754-3924(Online) - 2020 - в издания, индексирани в Scopus или Web of Science
    14. Darshana Pritam Shah, Namita Pritam Shah, Implementation of Digital Signature Algorithm by using Elliptical Curve p-192, Australian Journal of Wireless Technologies, Mobility & Security (ISSN: 2200-1883), 2019, Vol. 1, No 1 - 2019 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    15. Maria-Dolores Cano, Antonio Cañavate-Sanchez, Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA, Security and Communication Networks, Volume 2020,Article ID 4960964, https://doi.org/10.1155/2020/4960964, 2020 - 2020 - в издания, индексирани в Scopus или Web of Science
    16. Raya A., Mariyappn K., Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study, Proceedings of the 15th International Conference for Internet Technology and Secured Transactions (ICITST) 2020, (8-10 Dec. 2020), ISBN: 978-191357221-1; DOI: 10.23919/ICITST51030.2020.9351327 - 2020 - в издания, индексирани в Scopus или Web of Science
    17. Triyas Hevianto Saputro, Nur Hidayati Hidayati, Erik Iman H. Ujianto, Survei Tentang Algoritma Kriptografi Asimetris, JIP (Jurnal Informatika Polinema), Vol 6, No 2 (2020), 2020, pp. 67-72, ISSN: 2614-6371 E-ISSN: 2407-070X, DOI: 10.33795/jip.v6i2.345 - 2020 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    18. Shipra Varshney, Dheeraj Munjal, Ipsita Jash, Orijit Bhattacharya, Shagun Saboo, Cyber Crime Awareness and Corresponding Countermeasures, Proceedings of the International Conference on Innovative Computing & Communications (ICICC) 2020, (May 15, 2020), DOI: 10.2139/ssrn.3601807 - 2020 - в издания, индексирани в Scopus или Web of Science
    19. Milani S., Chatzigiannakis I., Design, analysis, and experimental evaluation of a new secure rejoin mechanism for LoRaWAN using elliptic-curve cryptography, Journal of Sensor and Actuator Networks, June 2021, Open Access, Vol. 10, Issue 2, ISSN: 22242708; DOI: 10.3390/JSAN10020036 - 2021 - в издания, индексирани в Scopus или Web of Science
    20. Goyal J., Ahmed M., Gopalani D., Empirical Study of Standard Elliptic Curve Domain Parameters for IoT Devices, 3rd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2021, June 2021, Kuala Lumpur, 12-13 June 2021, ISBN: 978-166543897-1; DOI: 10.1109/ICECCE52056.2021.9514179 - 2021 - в издания, индексирани в Scopus или Web of Science
    21. Grnac, A., Valocky, F., Orgon, M., Implementation of Elliptic Curve Cryptography Between Autonomous Vehicles and Control Center, Lecture Notes in Networks and Systems, vol. 230, pp. 718-729, 10th Computer Science Online Conference, CSOC 2021, Virtual, Online, 1 April 2021, ISSN: 23673370; ISBN: 978-303077441-7, DOI: 10.1007/978-3-030-77442-4_60 - 2021 - в издания, индексирани в Scopus или Web of Science
    22. Subhajit Adhikari, Sunil Karforma, A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence, Multimedia Tools and Applications, 16 September 2021 - 2021 - в издания, индексирани в Scopus или Web of Science
    23. Fatimah Alkhudhayr, Tarek Moulahi, Abdulatif Alabdulatif, Evaluation Study of Elliptic Curve Cryptography Scalar Multiplication on Raspberry Pi4, International Journal of Advanced Computer Science and Applications (IJACSA), vol.12, No. 9, pp. 472 – 479, 2021, DOI: 10.14569/IJACSA.2021.0120954 - 2021 - в издания, индексирани в Scopus или Web of Science
    24. Deepak S. Sakkari, Mohammed Mujeer Ulla, Design and Implementation of Elliptic Curve Digital Signature Using Bit Coin Curves Secp256K1 and Secp384R1 for Base10 and Base16 Using Java, in the book Innovation in Electrical Power Engineering, Communication, and Computing Technology. pp. 323, editors- Mishra M., Sharma R., Kumar Rathore A., Nayak J., Naik B. Print ISBN: 978-981-16-7075-6; Online ISBN: 978-981-16-7076-3, DOI: 10.1007/978-981-16-7076-3_28. Lecture Notes in Electrical Engineering, vol 814. Springer, Singapore, Electronic ISSN: 1876-1119; Print ISSN: 1876-1100 - 2021 - в издания, индексирани в Scopus или Web of Science
    25. Spina, Mattia Giovanni, Stefano Gualtieri, and Floriano De Rango. "Integrating ROS and Gazebo Tools with a Network Security Module to Support Secure Autonomous Robot Coordination." n Proceedings of the 11th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2021), pages 369-377 ISBN: 978-989-758-528-9 (2021) - 2021 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    26. Sakkari, Deepak S., ulla, Mohammed Mujeer, Review on Insight into Elliptic Curve Cryptography, Studies in Computational Intelligence, Vol. 1027, pp. 81 – 93, ISSN: 1860949X, DOI: 10.1007/978-3-030-96634-8_8, 2022 - 2022 - в издания, индексирани в Scopus или Web of Science
    27. Ait Oussous, Salma, Yachou, Mohammed, El Aidi, Sanaa, , Beloualid, Siham, El Harrouti, Taoufiq, El Allali, Abdelhadi, Bajit, Abderrahim, , Tamtoui, Ahmed, Applying a Lightweight ECC Encryption in Multi-topology Sensor Networks to Enhance Intelligent IoT Low-Cost Transportation Platforms Security Based on CoAP Constrained Protocol, Lecture Notes on Data Engineering and Communications Technologies, Book Chapter, Vol. 127, pp. 359-370, DOI: 10.1007/978-3-030-98741-1_30, Publisher: Springer Nature, ISSN:2367-4512, E-ISSN:2367-4520, 2022 - 2022 - в издания, индексирани в Scopus или Web of Science
    28. Houpeng Hu, Jiaxiang Ou, Bin Qian, Yi Luo, Peilin He, Mi Zhou, Zerui Chen, A Practical Anonymous Voting Scheme Based on Blockchain for Internet of Energy, Security and Communication Networks, Privacy-Enhancing Authentication and Computation for Human CPS and IoT (Special Issue), Willey, Volume 2022, Article ID 4436824, https://doi.org/10.1155/2022/4436824 - 2022 - в издания, индексирани в Scopus или Web of Science
    29. Subhajit Adhikari, Sunil Karforma, A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence, Multimedia Tools and Applications, Springer, Vol. 81, Issue 1, pp. 759 – 784, January 2022, ISSN: 13807501; DOI: 10.1007/s11042-021-11323-y, 2022 - 2022 - в издания, индексирани в Scopus или Web of Science
    30. Hamza, Fatima Zahra, El Aidi, Sanaa, El Allali, Abdelhadi, Beloualid, Siham, Bajit, Abderrahim, Tamtaoui, Ahmed, Applying Lightweight Elliptic Curve Cryptography ECC and Advanced IoT Network Topologies to Optimize COVID-19 Sanitary Passport Platforms Based on Constrained Application Protocol, Lecture Notes on Data Engineering and Communications Technologies, Book Chapter, Vol. 127, pp. 512-523, DOI: 10.1007/978-3-030-98741-1_42, Publisher: Springer Nature, ISSN:2367-4512, E-ISSN:2367-4520, 2022 - 2022 - в издания, индексирани в Scopus или Web of Science
    31. Himeur Yassine, Sohai, Shahab Saquib, Bensaali Faycal, Amira Abbes, Alazab Mamoun, Latest trends of security and privacy in recommender systems: A comprehensive review and future perspective, Computers and Security, Publisher: Elsevier, ISSN:0167-4048, Open Access, Vol. 118, July 2022, Article number 102746, DOI: 10.1016/j.cose.2022.102746, 2022 - 2022 - в издания, индексирани в Scopus или Web of Science
    32. Goulart A, Chennamaneni A, Torre D, Hur B, Al-Aboosi FY. On Wide-Area IoT Networks, Lightweight Security and Their Applications—A Practical Review. Electronics. 2022; 11(11):1762. https://doi.org/10.3390/electronics11111762 - 2022 - в издания, индексирани в Scopus или Web of Science
    33. Sakkari, Deepak S., and Mohammed Mujeer Ulla. "Design and Implementation of Identifying Points on Elliptic Curve Efficiently Using Java." Modern Approaches in Machine Learning & Cognitive Science: A Walkthrough. Springer, Cham, 2022. 95-105. https://doi.org/10.1007/978-3-030-96634-8_9 - 2022 - в издания, индексирани в Scopus или Web of Science
    34. Floriano De Rango, Fiore Veltri, and Mauro Tropea "An acoustic model for underwater communications based on Markov chain approach", Proc. SPIE 12118, Ocean Sensing and Monitoring XIV, 1211807 (30 May 2022); https://doi.org/10.1117/12.2623252 - 2022 - в издания, индексирани в Scopus или Web of Science
    35. Jin-Hui Piao, Yu-Jing Wu, and Yi-Nan Xu, A Security Framework for In-Vehicle FlexRay Bus Network, International Journal of Modeling and Optimization, vol. 12, No. 3, pp. 92-98, August 2022, DOI: 10.7763/IJMO.2022.V12.807 - 2022 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    36. Esau Taiwo Oladipupo, Oluwakemi Christiana Abikoye, Improved authenticated elliptic curve cryptography scheme for resource starve applications, Computer Science and Information Technologies, Vol. 3, No. 3, November 2022, pp. 169-185, ISSN: 2722-3221, DOI: 10.11591/csit.v3i3; pp169-185, 2022 - 2022 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science

    Вид: публикация в международен форум, публикация в реферирано издание, индексирана в Scopus и Web of Science