Autors: Javed R. Shaikh., Nenova, M. V., Iliev, G. L., Valkova-Jarvis, Z. V.
Title: Analysis of Standard Elliptic Curves for the Implementation of Elliptic Curve Cryptography in Resource-Constrained E-commerce Applications
Keywords: E-commerce, ECC, ECDH, ECDSA, RSA, Safe Elliptic Curves

References

    Issue

    International Conference on Microwaves, Communications, Antennas and Electronic Systems (IEEE COMCAS 2017), Tel Aviv, Israel, 13-15 November 2017, pp. 1 – 4; EID: 2-s2.0-85045832527; Accession Number: WOS:000426968600119; ISBN: 978-1-5386-3169-0; ISSN: 2150-895X, 2017, Israel, DOI: 10.1109/COMCAS.2017. 8244805

    Цитирания (Citation/s):
    1. Andreea Ancuta Corici, Yatindra Shashi, Marius Corici, Ranjan Shrestha, David Guzman, Enabling Dynamic IoT Security Domains: Cellular Core Network and Device Management Meet Authentication Framework, 2019 Global IoT Summit (GIoTS), 17-21 June 2019, Aarhus, Denmark, INSPEC Accession Number: 18848722; DOI: 10.1109/GIOTS.2019.8766390, Publisher: IEEE - 2019 - в издания, индексирани в Scopus или Web of Science
    2. Yousra Berguig, Jalal Laassiri, Sanae Hanaoui, Salah-ddine Krit, Mobile Agent Security Based on Mutual Authentication and Elliptic Curve Cryptography, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8 Issue-12, pp. 2509-2517, October 2019, DOI: 10.35940/ijitee.L3438.1081219 - 2019 - в издания, индексирани в Scopus или Web of Science
    3. Dhimas Riksa Prathama, Prasetyo Adi Wibowo Putro, Dani Ilman Naviangga, Secure mobile payment based on elliptic curve cryptography, 2018 International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2018, Grand Zuri Malioboro HotelYogyakarta; Indonesia; 21 - 22 November 2018, Art. No. 8864488, pp. 140-145, ISBN: 978-153867422-2; DOI: 10.1109/ISRITI.2018.8864488 - 2018 - в издания, индексирани в Scopus или Web of Science
    4. Narander Kumar, Jitendra Kumar Samriya, EAAP: Efficient Authentication Agreement Protocol Policy for Cloud Environment, 4th International Conference on Next-Generation Computing Technologies, NGCT 2018, Dehradun, India, 21–22 November 2018, Revised Selected Papers, DOI: 10.1007/978-981-15-1718-1_26 - 2018 - в издания, индексирани в Scopus или Web of Science
    5. Sirka, S.Email, Erdelyi, J., Cicak, P., Jelemenska, K., Survey on Security Threats and Algorithms in Internet of Things Environment, ICETA 2019 - 17th IEEE International Conference on Emerging eLearning Technologies and Applications, 21-22 Nov. 2019, Article number 9039994, pp. 721-726; ISBN: 978-172814967-7; DOI: 10.1109/ICETA48886.2019.9039994 - 2019 - в издания, индексирани в Scopus или Web of Science
    6. Long, Y., Cheng, M., Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption, Proceedings - 2019 15th International Conference on Computational Intelligence and Security, CIS 2019, 13-16 Dec. 2019, pp. 252-256; ISBN: 978-172816092-4; DOI: 10.1109/CIS.2019.00060; Article number 9023728 - 2019 - в издания, индексирани в Scopus или Web of Science
    7. Inamdar, M.A., Kumaraswamy, H.V., Accurate Primary User Emulation Attack (PUEA) Detection in Cognitive Radio Network using KNN and ANN Classifier, Proceedings of the 4th International Conference on Trends in Electronics and Informatics, ICOEI 2020, pp. 490-495, ISBN: 978-172815518-0, DOI: 10.1109/ICOEI48184.2020.9143015, Article number 9143015, SCAD College of Engineering and Technology Tirunelveli; India; 15-17 June 2020 - 2020 - в издания, индексирани в Scopus или Web of Science
    8. Samir Abo-Taleb, A., Shalaby, M., Nabil, M., Elramly, S., A Side-Channel Attack Resistive ECDSA, Journal of Physics: Conference Series, Volume 1454, Issue 1, 23 March 2020, Article number 012003; DOI: 10.1088/1742-6596/1454/1/012003 - 2020 - в издания, индексирани в Scopus или Web of Science
    9. Gagneja, K., Kiefer, R., Security Protocol for Internet of Things (IoT): Blockchain-based Implementation and Analysis, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020, 22-23 Feb. 2020, Miami; United States; ISBN: 978-172815797-9, DOI: 10.1109/MobiSecServ48690.2020.9042948 - 2020 - в издания, индексирани в Scopus или Web of Science
    10. Gagneja, K., Kiefer, R., IoT Devices with Non-interactive Key Management Protocol, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020, 22-23 Feb. 2020, Miami; United States, Article number 9042942, ISBN: 978-172815797-9, DOI: 10.1109/MobiSecServ48690.2020.9042942 - 2020 - в издания, индексирани в Scopus или Web of Science
    11. Singh, S.R., Ajoy, K.K., Choosing a Suitable Public Cryptosystem for Internet of Tthings, Journal of Computational and Theoretical Nanoscience, Volume 17, Issue 1, 2020, Pages 402-408, ISSN: 15461955, DOI: 10.1166/jctn.2020.8682 - 2020 - в издания, индексирани в Scopus или Web of Science
    12. Cano, M.-D., Cañavate-Sanchez, A., Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA, Security and Communication Networks (Open Access), Volume 2020, 2020, Article number 4960964, ISSN: 19390114, DOI: 10.1155/2020/4960964 - 2020 - в издания, индексирани в Scopus или Web of Science
    13. Rebiha Hadaoui, Karim Tamine, Mehammed Daoui, Mustapha Lalam, Cryptosystem by a community of devices with limited resources, International Journal of Communication Networks and Distributed Systems, Volume 25, Issue 1, 2020, Pages 21-42, DOI: 10.1504/IJCNDS.2020.108148; ISSN: 1754-3916(Print), ISSN: 1754-3924(Online) - 2020 - в издания, индексирани в Scopus или Web of Science
    14. Darshana Pritam Shah, Namita Pritam Shah, Implementation of Digital Signature Algorithm by using Elliptical Curve p-192, Australian Journal of Wireless Technologies, Mobility & Security (ISSN: 2200-1883), 2019, Vol. 1, No 1 - 2019 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    15. Maria-Dolores Cano, Antonio Cañavate-Sanchez, Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA, Security and Communication Networks, Volume 2020,Article ID 4960964, https://doi.org/10.1155/2020/4960964, 2020 - 2020 - в издания, индексирани в Scopus или Web of Science
    16. Raya A., Mariyappn K., Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study, Proceedings of the 15th International Conference for Internet Technology and Secured Transactions (ICITST) 2020, (8-10 Dec. 2020), ISBN: 978-191357221-1; DOI: 10.23919/ICITST51030.2020.9351327 - 2020 - в издания, индексирани в Scopus или Web of Science
    17. Triyas Hevianto Saputro, Nur Hidayati Hidayati, Erik Iman H. Ujianto, Survei Tentang Algoritma Kriptografi Asimetris, JIP (Jurnal Informatika Polinema), Vol 6, No 2 (2020), 2020, pp. 67-72, ISSN: 2614-6371 E-ISSN: 2407-070X, DOI: 10.33795/jip.v6i2.345 - 2020 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    18. Shipra Varshney, Dheeraj Munjal, Ipsita Jash, Orijit Bhattacharya, Shagun Saboo, Cyber Crime Awareness and Corresponding Countermeasures, Proceedings of the International Conference on Innovative Computing & Communications (ICICC) 2020, (May 15, 2020), DOI: 10.2139/ssrn.3601807 - 2020 - в издания, индексирани в Scopus или Web of Science
    19. Milani S., Chatzigiannakis I., Design, analysis, and experimental evaluation of a new secure rejoin mechanism for LoRaWAN using elliptic-curve cryptography, Journal of Sensor and Actuator Networks, June 2021, Open Access, Vol. 10, Issue 2, ISSN: 22242708; DOI: 10.3390/JSAN10020036 - 2021 - в издания, индексирани в Scopus или Web of Science
    20. Goyal J., Ahmed M., Gopalani D., Empirical Study of Standard Elliptic Curve Domain Parameters for IoT Devices, 3rd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2021, June 2021, Kuala Lumpur, 12-13 June 2021, ISBN: 978-166543897-1; DOI: 10.1109/ICECCE52056.2021.9514179 - 2021 - в издания, индексирани в Scopus или Web of Science
    21. Grnac, A., Valocky, F., Orgon, M., Implementation of Elliptic Curve Cryptography Between Autonomous Vehicles and Control Center, Lecture Notes in Networks and Systems, vol. 230, pp. 718-729, 10th Computer Science Online Conference, CSOC 2021, Virtual, Online, 1 April 2021, ISSN: 23673370; ISBN: 978-303077441-7, DOI: 10.1007/978-3-030-77442-4_60 - 2021 - в издания, индексирани в Scopus или Web of Science
    22. Subhajit Adhikari, Sunil Karforma, A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence, Multimedia Tools and Applications, 16 September 2021 - 2021 - в издания, индексирани в Scopus или Web of Science
    23. Fatimah Alkhudhayr, Tarek Moulahi, Abdulatif Alabdulatif, Evaluation Study of Elliptic Curve Cryptography Scalar Multiplication on Raspberry Pi4, International Journal of Advanced Computer Science and Applications (IJACSA), vol.12, No. 9, pp. 472 – 479, 2021, DOI: 10.14569/IJACSA.2021.0120954 - 2021 - в издания, индексирани в Scopus или Web of Science
    24. Deepak S. Sakkari, Mohammed Mujeer Ulla, Design and Implementation of Elliptic Curve Digital Signature Using Bit Coin Curves Secp256K1 and Secp384R1 for Base10 and Base16 Using Java, in the book Innovation in Electrical Power Engineering, Communication, and Computing Technology. pp. 323, editors- Mishra M., Sharma R., Kumar Rathore A., Nayak J., Naik B. Print ISBN: 978-981-16-7075-6; Online ISBN: 978-981-16-7076-3, DOI: 10.1007/978-981-16-7076-3_28. Lecture Notes in Electrical Engineering, vol 814. Springer, Singapore, Electronic ISSN: 1876-1119; Print ISSN: 1876-1100 - 2021 - в издания, индексирани в Scopus или Web of Science
    25. Sakkari D.S., Ulla M.M. (2022) Design and Implementation of Elliptic Curve Digital Signature Using Bit Coin Curves Secp256K1 and Secp384R1 for Base10 and Base16 Using Java. In: Mishra M., Sharma R., Kumar Rathore A., Nayak J., Naik B. (eds) Innovation in Electrical Power Engineering, Communication, and Computing Technology. Lecture Notes in Electrical Engineering, vol 814. Springer, Singapore. https://doi.org/10.1007/978-981-16-7076-3_28 - 2022 - в издания, индексирани в Scopus или Web of Science
    26. Spina, Mattia Giovanni, Stefano Gualtieri, and Floriano De Rango. "Integrating ROS and Gazebo Tools with a Network Security Module to Support Secure Autonomous Robot Coordination." n Proceedings of the 11th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2021), pages 369-377 ISBN: 978-989-758-528-9 (2021) - 2021 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science

    Вид: публикация в международен форум, публикация в реферирано издание, индексирана в Scopus и Web of Science