An identity based encryption using elliptic curve cryptography for secure M2M communication

Author(s):  
B. S. Adiga ◽  
P. Balamuralidhar ◽  
M. A. Rajan ◽  
Ravishankara Shastry ◽  
V. L. Shivraj
2012 ◽  
Vol 25 (8) ◽  
pp. 1111-1113
Author(s):  
Xiangxue Li ◽  
Haifeng Qian ◽  
Yuan Zhou

2020 ◽  
Vol 1 (2) ◽  
Author(s):  
O. R. Vincent ◽  
T. M. Okediran ◽  
A. A. Abayomi-Alli ◽  
O. J. Adeniran

Author(s):  
Kazuki NAGANUMA ◽  
Takashi SUZUKI ◽  
Hiroyuki TSUJI ◽  
Tomoaki KIMURA

Author(s):  
Jae Hong SEO ◽  
Tetsutaro KOBAYASHI ◽  
Miyako OHKUBO ◽  
Koutarou SUZUKI

Sign in / Sign up

Export Citation Format

Share Document