A more efficient and faster pairing computation with cryptographic security.
I. PraveenM. SethumadhavanPublished in: SECURIT (2012)
Keyphrases
- highly efficient
- smart card
- information security
- neural network
- key management
- security protocols
- computationally efficient
- security properties
- security requirements
- encryption algorithms
- elliptic curve cryptography
- random number generator
- security model
- encryption scheme
- network security
- intrusion detection
- information systems