Sciweavers

1769 search results - page 79 / 354
» Cryptography
Sort
View
IJNSEC
2007
126views more  IJNSEC 2007»
14 years 9 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
TIT
2008
73views more  TIT 2008»
14 years 9 months ago
Security Aspects of the Authentication Used in Quantum Cryptography
Jorgen Cederlof, Jan-Ake Larsson
IBMRD
2000
38views more  IBMRD 2000»
14 years 9 months ago
Cryptography
Don Coppersmith