Autors: Javed R. Shaikh., Nenova, M. V., Iliev, G. L., Valkova-Jarvis, Z. V. Title: Analysis of Standard Elliptic Curves for the Implementation of Elliptic Curve Cryptography in Resource-Constrained E-commerce Applications Keywords: E-commerce, ECC, ECDH, ECDSA, RSA, Safe Elliptic Curves References Issue
|
Цитирания (Citation/s):
1. Andreea Ancuta Corici, Yatindra Shashi, Marius Corici, Ranjan Shrestha, David Guzman, Enabling Dynamic IoT Security Domains: Cellular Core Network and Device Management Meet Authentication Framework, 2019 Global IoT Summit (GIoTS), 17-21 June 2019, Aarhus, Denmark, INSPEC Accession Number: 18848722; DOI: 10.1109/GIOTS.2019.8766390, Publisher: IEEE - 2019 - в издания, индексирани в Scopus или Web of Science
2. Yousra Berguig, Jalal Laassiri, Sanae Hanaoui, Salah-ddine Krit, Mobile Agent Security Based on Mutual Authentication and Elliptic Curve Cryptography, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8 Issue-12, pp. 2509-2517, October 2019, DOI: 10.35940/ijitee.L3438.1081219 - 2019 - в издания, индексирани в Scopus или Web of Science
3. Dhimas Riksa Prathama, Prasetyo Adi Wibowo Putro, Dani Ilman Naviangga, Secure mobile payment based on elliptic curve cryptography, 2018 International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2018, Grand Zuri Malioboro HotelYogyakarta; Indonesia; 21 - 22 November 2018, Art. No. 8864488, pp. 140-145, ISBN: 978-153867422-2; DOI: 10.1109/ISRITI.2018.8864488 - 2018 - в издания, индексирани в Scopus или Web of Science
4. Narander Kumar, Jitendra Kumar Samriya, EAAP: Efficient Authentication Agreement Protocol Policy for Cloud Environment, 4th International Conference on Next-Generation Computing Technologies, NGCT 2018, Dehradun, India, 21–22 November 2018, Revised Selected Papers, DOI: 10.1007/978-981-15-1718-1_26 - 2018 - в издания, индексирани в Scopus или Web of Science
5. Sirka, S.Email, Erdelyi, J., Cicak, P., Jelemenska, K., Survey on Security Threats and Algorithms in Internet of Things Environment, ICETA 2019 - 17th IEEE International Conference on Emerging eLearning Technologies and Applications, 21-22 Nov. 2019, Article number 9039994, pp. 721-726; ISBN: 978-172814967-7; DOI: 10.1109/ICETA48886.2019.9039994 - 2019 - в издания, индексирани в Scopus или Web of Science
6. Long, Y., Cheng, M., Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption, Proceedings - 2019 15th International Conference on Computational Intelligence and Security, CIS 2019, 13-16 Dec. 2019, pp. 252-256; ISBN: 978-172816092-4; DOI: 10.1109/CIS.2019.00060; Article number 9023728 - 2019 - в издания, индексирани в Scopus или Web of Science
7. Inamdar, M.A., Kumaraswamy, H.V., Accurate Primary User Emulation Attack (PUEA) Detection in Cognitive Radio Network using KNN and ANN Classifier, Proceedings of the 4th International Conference on Trends in Electronics and Informatics, ICOEI 2020, pp. 490-495, ISBN: 978-172815518-0, DOI: 10.1109/ICOEI48184.2020.9143015, Article number 9143015, SCAD College of Engineering and Technology Tirunelveli; India; 15-17 June 2020 - 2020 - в издания, индексирани в Scopus или Web of Science
8. Samir Abo-Taleb, A., Shalaby, M., Nabil, M., Elramly, S., A Side-Channel Attack Resistive ECDSA, Journal of Physics: Conference Series, Volume 1454, Issue 1, 23 March 2020, Article number 012003; DOI: 10.1088/1742-6596/1454/1/012003 - 2020 - в издания, индексирани в Scopus или Web of Science
9. Gagneja, K., Kiefer, R., Security Protocol for Internet of Things (IoT): Blockchain-based Implementation and Analysis, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020, 22-23 Feb. 2020, Miami; United States; ISBN: 978-172815797-9, DOI: 10.1109/MobiSecServ48690.2020.9042948 - 2020 - в издания, индексирани в Scopus или Web of Science
10. Gagneja, K., Kiefer, R., IoT Devices with Non-interactive Key Management Protocol, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020, 22-23 Feb. 2020, Miami; United States, Article number 9042942, ISBN: 978-172815797-9, DOI: 10.1109/MobiSecServ48690.2020.9042942 - 2020 - в издания, индексирани в Scopus или Web of Science
11. Singh, S.R., Ajoy, K.K., Choosing a Suitable Public Cryptosystem for Internet of Tthings, Journal of Computational and Theoretical Nanoscience, Volume 17, Issue 1, 2020, Pages 402-408, ISSN: 15461955, DOI: 10.1166/jctn.2020.8682 - 2020 - в издания, индексирани в Scopus или Web of Science
12. Cano, M.-D., Cañavate-Sanchez, A., Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA, Security and Communication Networks (Open Access), Volume 2020, 2020, Article number 4960964, ISSN: 19390114, DOI: 10.1155/2020/4960964 - 2020 - в издания, индексирани в Scopus или Web of Science
13. Rebiha Hadaoui, Karim Tamine, Mehammed Daoui, Mustapha Lalam, Cryptosystem by a community of devices with limited resources, International Journal of Communication Networks and Distributed Systems, Volume 25, Issue 1, 2020, Pages 21-42, DOI: 10.1504/IJCNDS.2020.108148; ISSN: 1754-3916(Print), ISSN: 1754-3924(Online) - 2020 - в издания, индексирани в Scopus или Web of Science
14. Darshana Pritam Shah, Namita Pritam Shah, Implementation of Digital Signature Algorithm by using Elliptical Curve p-192, Australian Journal of Wireless Technologies, Mobility & Security (ISSN: 2200-1883), 2019, Vol. 1, No 1 - 2019 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
15. Maria-Dolores Cano, Antonio Cañavate-Sanchez, Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA, Security and Communication Networks, Volume 2020,Article ID 4960964, https://doi.org/10.1155/2020/4960964, 2020 - 2020 - в издания, индексирани в Scopus или Web of Science
16. Raya A., Mariyappn K., Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study, Proceedings of the 15th International Conference for Internet Technology and Secured Transactions (ICITST) 2020, (8-10 Dec. 2020), ISBN: 978-191357221-1; DOI: 10.23919/ICITST51030.2020.9351327 - 2020 - в издания, индексирани в Scopus или Web of Science
17. Triyas Hevianto Saputro, Nur Hidayati Hidayati, Erik Iman H. Ujianto, Survei Tentang Algoritma Kriptografi Asimetris, JIP (Jurnal Informatika Polinema), Vol 6, No 2 (2020), 2020, pp. 67-72, ISSN: 2614-6371 E-ISSN: 2407-070X, DOI: 10.33795/jip.v6i2.345 - 2020 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
18. Shipra Varshney, Dheeraj Munjal, Ipsita Jash, Orijit Bhattacharya, Shagun Saboo, Cyber Crime Awareness and Corresponding Countermeasures, Proceedings of the International Conference on Innovative Computing & Communications (ICICC) 2020, (May 15, 2020), DOI: 10.2139/ssrn.3601807 - 2020 - в издания, индексирани в Scopus или Web of Science
19. Milani S., Chatzigiannakis I., Design, analysis, and experimental evaluation of a new secure rejoin mechanism for LoRaWAN using elliptic-curve cryptography, Journal of Sensor and Actuator Networks, June 2021, Open Access, Vol. 10, Issue 2, ISSN: 22242708; DOI: 10.3390/JSAN10020036 - 2021 - в издания, индексирани в Scopus или Web of Science
20. Goyal J., Ahmed M., Gopalani D., Empirical Study of Standard Elliptic Curve Domain Parameters for IoT Devices, 3rd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2021, June 2021, Kuala Lumpur, 12-13 June 2021, ISBN: 978-166543897-1; DOI: 10.1109/ICECCE52056.2021.9514179 - 2021 - в издания, индексирани в Scopus или Web of Science
21. Grnac, A., Valocky, F., Orgon, M., Implementation of Elliptic Curve Cryptography Between Autonomous Vehicles and Control Center, Lecture Notes in Networks and Systems, vol. 230, pp. 718-729, 10th Computer Science Online Conference, CSOC 2021, Virtual, Online, 1 April 2021, ISSN: 23673370; ISBN: 978-303077441-7, DOI: 10.1007/978-3-030-77442-4_60 - 2021 - в издания, индексирани в Scopus или Web of Science
22. Subhajit Adhikari, Sunil Karforma, A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence, Multimedia Tools and Applications, 16 September 2021 - 2021 - в издания, индексирани в Scopus или Web of Science
23. Fatimah Alkhudhayr, Tarek Moulahi, Abdulatif Alabdulatif, Evaluation Study of Elliptic Curve Cryptography Scalar Multiplication on Raspberry Pi4, International Journal of Advanced Computer Science and Applications (IJACSA), vol.12, No. 9, pp. 472 – 479, 2021, DOI: 10.14569/IJACSA.2021.0120954 - 2021 - в издания, индексирани в Scopus или Web of Science
24. Deepak S. Sakkari, Mohammed Mujeer Ulla, Design and Implementation of Elliptic Curve Digital Signature Using Bit Coin Curves Secp256K1 and Secp384R1 for Base10 and Base16 Using Java, in the book Innovation in Electrical Power Engineering, Communication, and Computing Technology. pp. 323, editors- Mishra M., Sharma R., Kumar Rathore A., Nayak J., Naik B. Print ISBN: 978-981-16-7075-6; Online ISBN: 978-981-16-7076-3, DOI: 10.1007/978-981-16-7076-3_28. Lecture Notes in Electrical Engineering, vol 814. Springer, Singapore, Electronic ISSN: 1876-1119; Print ISSN: 1876-1100 - 2021 - в издания, индексирани в Scopus или Web of Science
25. Spina, Mattia Giovanni, Stefano Gualtieri, and Floriano De Rango. "Integrating ROS and Gazebo Tools with a Network Security Module to Support Secure Autonomous Robot Coordination." n Proceedings of the 11th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2021), pages 369-377 ISBN: 978-989-758-528-9 (2021) - 2021 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
26. Sakkari, Deepak S., ulla, Mohammed Mujeer, Review on Insight into Elliptic Curve Cryptography, Studies in Computational Intelligence, Vol. 1027, pp. 81 – 93, ISSN: 1860949X, DOI: 10.1007/978-3-030-96634-8_8, 2022 - 2022 - в издания, индексирани в Scopus или Web of Science
27. Ait Oussous, Salma, Yachou, Mohammed, El Aidi, Sanaa, , Beloualid, Siham, El Harrouti, Taoufiq, El Allali, Abdelhadi, Bajit, Abderrahim, , Tamtoui, Ahmed, Applying a Lightweight ECC Encryption in Multi-topology Sensor Networks to Enhance Intelligent IoT Low-Cost Transportation Platforms Security Based on CoAP Constrained Protocol, Lecture Notes on Data Engineering and Communications Technologies, Book Chapter, Vol. 127, pp. 359-370, DOI: 10.1007/978-3-030-98741-1_30, Publisher: Springer Nature, ISSN:2367-4512, E-ISSN:2367-4520, 2022 - 2022 - в издания, индексирани в Scopus или Web of Science
28. Houpeng Hu, Jiaxiang Ou, Bin Qian, Yi Luo, Peilin He, Mi Zhou, Zerui Chen, A Practical Anonymous Voting Scheme Based on Blockchain for Internet of Energy, Security and Communication Networks, Privacy-Enhancing Authentication and Computation for Human CPS and IoT (Special Issue), Willey, Volume 2022, Article ID 4436824, https://doi.org/10.1155/2022/4436824 - 2022 - в издания, индексирани в Scopus или Web of Science
29. Subhajit Adhikari, Sunil Karforma, A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence, Multimedia Tools and Applications, Springer, Vol. 81, Issue 1, pp. 759 – 784, January 2022, ISSN: 13807501; DOI: 10.1007/s11042-021-11323-y, 2022 - 2022 - в издания, индексирани в Scopus или Web of Science
30. Hamza, Fatima Zahra, El Aidi, Sanaa, El Allali, Abdelhadi, Beloualid, Siham, Bajit, Abderrahim, Tamtaoui, Ahmed, Applying Lightweight Elliptic Curve Cryptography ECC and Advanced IoT Network Topologies to Optimize COVID-19 Sanitary Passport Platforms Based on Constrained Application Protocol, Lecture Notes on Data Engineering and Communications Technologies, Book Chapter, Vol. 127, pp. 512-523, DOI: 10.1007/978-3-030-98741-1_42, Publisher: Springer Nature, ISSN:2367-4512, E-ISSN:2367-4520, 2022 - 2022 - в издания, индексирани в Scopus или Web of Science
31. Himeur Yassine, Sohai, Shahab Saquib, Bensaali Faycal, Amira Abbes, Alazab Mamoun, Latest trends of security and privacy in recommender systems: A comprehensive review and future perspective, Computers and Security, Publisher: Elsevier, ISSN:0167-4048, Open Access, Vol. 118, July 2022, Article number 102746, DOI: 10.1016/j.cose.2022.102746, 2022 - 2022 - в издания, индексирани в Scopus или Web of Science
32. Goulart A, Chennamaneni A, Torre D, Hur B, Al-Aboosi FY. On Wide-Area IoT Networks, Lightweight Security and Their Applications—A Practical Review. Electronics. 2022; 11(11):1762. https://doi.org/10.3390/electronics11111762 - 2022 - в издания, индексирани в Scopus или Web of Science
33. Sakkari, Deepak S., and Mohammed Mujeer Ulla. "Design and Implementation of Identifying Points on Elliptic Curve Efficiently Using Java." Modern Approaches in Machine Learning & Cognitive Science: A Walkthrough. Springer, Cham, 2022. 95-105. https://doi.org/10.1007/978-3-030-96634-8_9 - 2022 - в издания, индексирани в Scopus или Web of Science
34. Floriano De Rango, Fiore Veltri, and Mauro Tropea "An acoustic model for underwater communications based on Markov chain approach", Proc. SPIE 12118, Ocean Sensing and Monitoring XIV, 1211807 (30 May 2022); https://doi.org/10.1117/12.2623252 - 2022 - в издания, индексирани в Scopus или Web of Science
35. Jin-Hui Piao, Yu-Jing Wu, and Yi-Nan Xu, A Security Framework for In-Vehicle FlexRay Bus Network, International Journal of Modeling and Optimization, vol. 12, No. 3, pp. 92-98, August 2022, DOI: 10.7763/IJMO.2022.V12.807 - 2022 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
36. Esau Taiwo Oladipupo, Oluwakemi Christiana Abikoye, Improved authenticated elliptic curve cryptography scheme for resource starve applications, Computer Science and Information Technologies, Vol. 3, No. 3, November 2022, pp. 169-185, ISSN: 2722-3221, DOI: 10.11591/csit.v3i3; pp169-185, 2022 - 2022 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
37. Raghunandan K.R., Dodmane Radhakrishna, Bhavya K., Rao N. S. Krishnaraj, Sahu Aditya Kumar, Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing, IEEE AccessOpen Access, Vol. 11, pp. 3545 – 3554, ISSN: 21693536, DOI: 10.1109/ACCESS.2022.3232461, 2023 - 2023 - в издания, индексирани в Scopus или Web of Science
38. Luo, Yi, Zhou Mi, Hu Houpeng, Xiao Yong, Ou Jiaxiang, Qian Bin, Xiao Yanhong, Blockchain-based Biddings Protocol for Cyber-Physical System, Journal of Network Intelligence, Vol. 8, Issue 1, pp. 211 – 223, ISSN: 24148105, 2023 - 2023 - в издания, индексирани в Scopus или Web of Science
39. Rajesh S.M., Prabha R., Lightweight Cryptographic Approach to Address the Security Issues in Intelligent Applications: A Survey, IDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, pp. 122 – 128, Bengaluru, 5-7 January 2023, ISBN: 978-166547451-1; DOI: 10.1109/IDCIoT56793.2023.10053412, 2023 - 2023 - в издания, индексирани в Scopus или Web of Science
40. Mohammed Mujeer Ulla, Deepak S. Sakkari, Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1,NIST256p,NIST521p and LLL, Journal of Cyber Security and Mobility, River Publishers, ISSN:2245-1439; E-ISSN:2245-4578; Posted Date: March 6th, 2023, DOI: 10.13052/jcsm2245-1439.1215 - 2023 - в издания, индексирани в Scopus или Web of Science
41. Bin Qian, Yi Luo, Jiaxiang Ou, Yong Xiao, Houpeng Hu, IoETTS: A Decentralized Blockchain-based Trusted Time-stamping Scheme for Internet of Energy, Journal of Internet Technology Vol. 24 No. 2, March 2023; DOI: 10.53106/160792642023032402027, 2023 - 2023 - в издания, индексирани в Scopus или Web of Science
42. Mohammed Mujeer Ulla, Deepak S. Sakkari, Application of Elliptic Curve Crypto System to Secure MultiSignature Bitcoin Block Chain, Journal of Computer Science, 2023, Vol.19, Issue:1, pp.112-125, DOI: 10.3844/jcssp.2023.112.125 - 2023 - в издания, индексирани в Scopus или Web of Science
43. Ding, WJ, Zhou JY, Yang, W; Tang, Y, An efficient encoding mechanism against eavesdropper with side channel information, AUTOMATICA, Vol. 153, 2023, Publisher: PERGAMON-ELSEVIER SCIENCE LTD; ISSN: 0005-1098; eISSN: 1873-2836; DOI: 10.1016/j.automatica.2023.111062 - 2023 - в издания, индексирани в Scopus или Web of Science
44. Ulla, M.M., Khan, M.S., Preethi, Sakkari, D.S., Security and Performance Analysis of Elliptic Curve Crypto System using Bitcoin Curves, IAENG International Journal of Computer Science, Vol. 50, Issue 2, 2023, ISSN:1819-656X; E-ISSN:1819-9224 - 2023 - в издания, индексирани в Scopus или Web of Science
45. Chowdary, G.N.M., Lakshmi, M.P.S.R., Nylu, Y., (...), Prasad, K.V., Kannaiah, S.K., Elliptic Curve Cryptography for Network Security, 6th International Conference on Inventive Computation Technologies, ICICT 2023 – Proceedings, pp. 1500-1503, 26-28 April 2023, ISBN: 979-835039849-6; DOI: 10.1109/ICICT57646.2023.10134492 - 2023 - в издания, индексирани в Scopus или Web of Science
46. Shaik Mohammad Ilias, V. Ceronmani Sharmila, A Hybrid Post-Quantum Cryptography Driven Key Exchange Scheme for Cloud Computing Environments, International Conference on Intelligent Sustainable Systems, ICoISS 3-4 Feb. 2023; Part of the Lecture Notes in Networks and Systems book series (LNNS) Vol. 665 pp. 523–535; ISSN: 23673370; ISBN: 978-981991725-9; DOI: 10.1007/978-981-99-1726-6_40 - 2023 - в издания, индексирани в Scopus или Web of Science
47. C. V. Suresh Babu, P. M. Akshara, Virtual Threats and Asymmetric Military Challenges (Chapter 4), Source Title (Book): Cyber Security Policies and Strategies of the World's Leading States (Chitadze, Nika), pp. 49-68, IGI Global, 2023, ISBN: 978-166848847-8, 978-166848846-1; DOI: 10.4018/978-1-6684-8846-1.ch004 - 2023 - в издания, индексирани в Scopus или Web of Science
48. Gorantla Naga Manoj Chowdary, Medapati Phani Sri Rama Lakshmi, Yarababugari Nylu, Botta Deepthi, KV Prasad, Sathish Kumar Kannaiah, Elliptic Curve Cryptography for Network Security, 2023 International Conference on Inventive Computation Technologies (ICICT), 26-28 April 2023, Lalitpur, Nepal, pp. 1500-1503; ISBN:979-8-3503-9849-6; ISSN: 2767-7788; DOI: 10.1109/ICICT57646.2023.10134492 - 2023 - в издания, индексирани в Scopus или Web of Science
49. Sujit Sangram Sahoo, Vijay Kumar Chaurasiya, EASB: ECC based aggregate signature without bilinear pairing for blockchain, Multimedia Tools and Applications, 26 September 2023, Springer, ; ISSN: 1380-7501; DOI: https://doi.org/10.1007/s11042-023-17002-4 - 2023 - в издания, индексирани в Scopus или Web of Science
50. Mohamed Ali Shaaban, Almohammady S. Alsharkawy, Mohammad T. AbouKreisha, Mohammed Abdel Razek, Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment, International Journal of Computer Networks & Communications (IJCNC), Vol. 15, Issue: 4, pp. 55-71, July 2023, ISSN: 0975-2293; E-ISSN: 0974-9322; DOI: 10.5121/ijcnc.2023.15404 - 2023 - в издания, индексирани в Scopus или Web of Science
51. Mohammed Mujeer Ulla, Preethi, Md. Sameeruddin Khan, Deepak S. Sakkari, Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL, Journal of ICT Standardization, Vol. 11, Issue: 4, pp. 329 – 353, November 2023, River Publishers, DOI: 10.13052/jicts2245-800X.1141 - 2023 - в издания, индексирани в Scopus или Web of Science
52. Md Ashraful Islam Romel, Md. Rafiul Islam, Fathun Karim Fattah, FPGA Implementation of Elliptic Curve Point Multiplication for a 256-bit Processor on NIST Prime Field, 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), 06-08 July 2023, Delhi, India, ISSN: 2473-7674; DOI: 10.1109/ICCCNT56998.2023.10308185 - 2023 - в издания, индексирани в Scopus или Web of Science
53. Mohammed Mujeer Ulla, Deepak S Sakkari, Research on elliptic curve crypto system with curves Bitcoin- SECP256k1, NIST256p, NIST521p and LLL, Journal of Cyber Security and Mobility, Vol. 12, Issue 1, pp. 103 - 128, 2023, DOI: 10.13052/jcsm2245-1439.1215, . ISSN: 22451439 - 2023 - в издания, индексирани в Scopus или Web of Science
Вид: публикация в международен форум, публикация в реферирано издание, индексирана в Scopus и Web of Science