Next generation security for wireless: elliptic curve cryptography.
Scott A. VanstonePublished in: Comput. Secur. (2003)
Keyphrases
- data sharing
- elliptic curve cryptography
- security analysis
- encryption scheme
- cryptographic algorithms
- elliptic curve
- public key
- high security
- authentication scheme
- digital watermark
- public key cryptography
- wireless communication
- public key cryptosystems
- wireless networks
- error correction
- image encryption
- mobile devices
- security model
- smart card
- diffie hellman
- low cost
- user authentication
- security requirements
- authentication protocol