Login / Signup
Next generation security for wireless: elliptic curve cryptography.
Scott A. Vanstone
Published in:
Comput. Secur. (2003)
Keyphrases
</>
data sharing
elliptic curve cryptography
security analysis
encryption scheme
cryptographic algorithms
elliptic curve
public key
high security
authentication scheme
digital watermark
public key cryptography
wireless communication
public key cryptosystems
wireless networks
error correction
image encryption
mobile devices
security model
smart card
diffie hellman
low cost
user authentication
security requirements
authentication protocol