Journal articles on the topic 'Curve-key'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Curve-key.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Krishna, Addepalli V. N., and Addepalli Hari Narayana. "Cubic spline curve public key cryptography." Journal of Discrete Mathematical Sciences and Cryptography 20, no. 2 (February 17, 2017): 453–61. http://dx.doi.org/10.1080/09720529.2015.1112512.
Full textBaer, Wolfram. "Key Curve-Einprobenverfahren zur Ermittlung dynamischer Risswiderstandskurven." Materials Testing 47, no. 11-12 (November 2005): 666–73. http://dx.doi.org/10.3139/120.100701.
Full textAljamaly, Karrar Taher R., and Ruma Kareem K. Ajeena. "The KR-Elliptic Curve Public Key Cryptosystem." Journal of Physics: Conference Series 1879, no. 3 (May 1, 2021): 032046. http://dx.doi.org/10.1088/1742-6596/1879/3/032046.
Full textVasundhara, Dr S. "Elliptic curve Cryptography and Diffie- Hellman Key exchange." IOSR Journal of Mathematics 13, no. 01 (January 2017): 56–61. http://dx.doi.org/10.9790/5728-1301015661.
Full textSimonsohn, Uri, Leif D. Nelson, and Joseph P. Simmons. "P-curve: A key to the file-drawer." Journal of Experimental Psychology: General 143, no. 2 (2014): 534–47. http://dx.doi.org/10.1037/a0033242.
Full textZhang, Yong Hong, L. H. Wang, and De Jin Hu. "Key Technologies of Image Measurement for Curve Accurate Grinding." Key Engineering Materials 329 (January 2007): 533–38. http://dx.doi.org/10.4028/www.scientific.net/kem.329.533.
Full textReddy, P. Vasudeva, and M. Padmavathamma. "An authenticated key exchange protocol in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 5 (October 2007): 697–705. http://dx.doi.org/10.1080/09720529.2007.10698150.
Full textC., Sivakumar Chellappan. "Efficient Group Key Management Using Whale Optimization Algorithm based Elliptic Curve Cryptography for Dynamic Multicast Groups." Journal of Advanced Research in Dynamical and Control Systems 12, SP3 (February 28, 2020): 1078–92. http://dx.doi.org/10.5373/jardcs/v12sp3/20201354.
Full textErnst, M., B. Henhapl, S. Klupsch, and S. Huss. "FPGA based hardware acceleration for elliptic curve public key cryptosystems." Journal of Systems and Software 70, no. 3 (March 2004): 299–313. http://dx.doi.org/10.1016/s0164-1212(03)00075-x.
Full textB.J., Santhosh Kumar, and Kruthika Vijay. "Symmetric Key based Encryption and Decryption using Lissajous Curve Equations." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 1 (February 1, 2017): 285. http://dx.doi.org/10.11591/ijece.v7i1.pp285-288.
Full textVigila, S. Maria Celestin, and K. Muneeswaran. "Key generation based on elliptic curve over finite prime field." International Journal of Electronic Security and Digital Forensics 4, no. 1 (2012): 65. http://dx.doi.org/10.1504/ijesdf.2012.045391.
Full textPouw, Mieke F., Charlotte L. Krieckaert, Michael T. Nurmohamed, Desiree van der Kleij, Lucien Aarden, Theo Rispens, and Gertjan Wolbink. "Key findings towards optimising adalimumab treatment: the concentration–effect curve." Annals of the Rheumatic Diseases 74, no. 3 (December 10, 2013): 513–18. http://dx.doi.org/10.1136/annrheumdis-2013-204172.
Full textGajbhiye, Samta, Sanjeev Karmakar, and Monisha Sharma. "Diffie-Hellman Key Agreement with Elliptic Curve Discrete Logarithm Problem." International Journal of Computer Applications 129, no. 12 (November 17, 2015): 25–27. http://dx.doi.org/10.5120/ijca2015907030.
Full textByrne, Daniel, Nilufer Onder, and Zhenlin Wang. "mPart: miss-ratio curve guided partitioning in key-value stores." ACM SIGPLAN Notices 53, no. 5 (December 7, 2018): 84–95. http://dx.doi.org/10.1145/3299706.3210571.
Full textJaiswal, Priyanka, and Sachin Tripathi. "An authenticated group key transfer protocol using elliptic curve cryptography." Peer-to-Peer Networking and Applications 10, no. 4 (February 10, 2016): 857–64. http://dx.doi.org/10.1007/s12083-016-0434-7.
Full textYin, X. C. "A simple iterative key curve method for determining JR curves." International Journal of Pressure Vessels and Piping 53, no. 1 (January 1992): 143–57. http://dx.doi.org/10.1016/0308-0161(93)90108-6.
Full textRusovs, Gundars. "Biomechanical Response to Dynamic Curve Loading as the Key Factor in Structural Curve Formation in Idiopathic Scoliosis." International Journal of Rehabilitation Research 32 (August 2009): S34. http://dx.doi.org/10.1097/00004356-200908001-00046.
Full textEkta Narwal , Sumeet Gill, Ekta Narwal ,. Sumeet Gill. "Secure and Faster Key Management of Elliptical Curve Cryptography in Vanets." International Journal of Computer Science Engineering and Information Technology Research 7, no. 4 (2017): 25–30. http://dx.doi.org/10.24247/ijcseitraug20174.
Full textRajendiran, Kishore. "A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography." ETRI Journal 33, no. 5 (October 4, 2011): 791–801. http://dx.doi.org/10.4218/etrij.11.0110.0665.
Full textPratapSingh, Uday, and Rajkumar Singh Rathore. "Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function." International Journal of Computer Applications 61, no. 19 (January 18, 2013): 35–40. http://dx.doi.org/10.5120/10039-5055.
Full textWang, Jianliang, and Lianyong Feng. "Curve-fitting models for fossil fuel production forecasting: Key influence factors." Journal of Natural Gas Science and Engineering 32 (May 2016): 138–49. http://dx.doi.org/10.1016/j.jngse.2016.04.013.
Full textSingh, Soram Ranbir, and Khan Kumar Ajoy. "Key Management Scheme for Internet of Things Using an Elliptic Curve." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 115–21. http://dx.doi.org/10.1166/jctn.2020.8637.
Full textSingh, Soram Ranbir, and Khan Kumar Ajoy. "An Elliptic Curve based Key Management Scheme for Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 409–17. http://dx.doi.org/10.1166/jctn.2020.8683.
Full textGuyton, A. C. "Renal function curve--a key to understanding the pathogenesis of hypertension." Hypertension 10, no. 1 (July 1987): 1–6. http://dx.doi.org/10.1161/01.hyp.10.1.1.
Full textZhang, Qiang, Xiang Xue, Dongsheng Zhou, and Xiaopeng Wei. "Motion Key-frames extraction based on amplitude of distance characteristic curve." International Journal of Computational Intelligence Systems 7, no. 3 (October 28, 2013): 506–14. http://dx.doi.org/10.1080/18756891.2013.859873.
Full textKaabneh, K., and H. Al-Bdour. "Key Exchange Protocol in Elliptic Curve Cryptography with No Public Point." American Journal of Applied Sciences 2, no. 8 (August 1, 2005): 1232–35. http://dx.doi.org/10.3844/ajassp.2005.1232.1235.
Full textSu, Pin-Chang, Erl-Huei Lu, and Henry Ker-Chang Chang. "A knapsack public-key cryptosystem based on elliptic curve discrete logarithm." Applied Mathematics and Computation 168, no. 1 (September 2005): 40–46. http://dx.doi.org/10.1016/j.amc.2004.08.027.
Full textSui, Aifen, Lucas C. K. Hui, Yixian Yang, and K. P. Chow. "Elliptic curve cryptography based authenticated key agreement with pre-shared password." Journal of Electronics (China) 22, no. 3 (May 2005): 268–72. http://dx.doi.org/10.1007/bf02687982.
Full textUdin, Md Nizam, Farah Azaliney Mohd Amin, Aminah Abdul Malek, Nur Annisa Zulkifili, Nur Atiqah Ghazali, and Siti Aisyah Mohd Ridzuwan. "IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY." MALAYSIAN JOURNAL OF COMPUTING 6, no. 2 (May 12, 2021): 812. http://dx.doi.org/10.24191/mjoc.v6i2.11508.
Full textBrünighaus, K., W. Hesse, M. Twickler, R. Twickler, and W. Dahl. "THE INFLUENCE OF LOADING RATE ON JR-CURVE OF 20 MnMoNi 5 5 STEEL USING THE KEY CURVE METHOD." Le Journal de Physique Colloques 46, no. C5 (August 1985): C5–227—C5–232. http://dx.doi.org/10.1051/jphyscol:1985529.
Full textShen, Yong Luo, Jun Zhang, Di Wei Yang, and Lin Bo Luo. "A Bezier Curve Based Key Management Scheme for Hierarchical Wireless Sensor Networks." Applied Mechanics and Materials 263-266 (December 2012): 2979–85. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2979.
Full textChinniah, Porkodi, and Sangavai Krishnamoorthi. "An Efficient Elliptic Curve based Key Management Scheme for Distributed Sensor Networks." European Journal of Engineering Research and Science 4, no. 6 (June 26, 2019): 111–16. http://dx.doi.org/10.24018/ejers.2019.4.6.1316.
Full textWU, Yu, Xue-peng JIA, and Hong-bo LI. "Key frame extraction based on curvature detection of multi-feature similarity curve." Journal of Computer Applications 28, no. 12 (February 26, 2009): 3084–88. http://dx.doi.org/10.3724/sp.j.1087.2008.03084.
Full textRay, Sangram, and Biswas G. P. "Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography." International Journal on Cryptography and Information Security 3, no. 1 (March 31, 2013): 25–37. http://dx.doi.org/10.5121/ijcis.2013.3104.
Full textAlghazzawi, Daniyal M. "A Novel Password based Multi Party Key Agreement Protocol on Elliptic Curve." International Journal of Computer Science and Information Technology 4, no. 1 (February 29, 2012): 75–82. http://dx.doi.org/10.5121/ijcsit.2012.4106.
Full textNimbhorkar, Sonali, and Latesh Malik. "Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography." Procedia Computer Science 78 (2016): 824–30. http://dx.doi.org/10.1016/j.procs.2016.02.065.
Full textHe, Debiao, Lina Wang, Huaqun Wang, and Muhammad Khurram Khan. "Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography." IET Communications 10, no. 14 (September 20, 2016): 1795–802. http://dx.doi.org/10.1049/iet-com.2016.0091.
Full textShengbao Wang, Zhenfu Cao, M. A. Strangio, and Lihua Wang. "Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol." IEEE Communications Letters 12, no. 2 (February 2008): 149–51. http://dx.doi.org/10.1109/lcomm.2008.071307.
Full textPhoa, Wesley, and Michael Shearer. "A Note on Arbitrary Yield Curve Reshaping Sensitivities Using Key Rate Durations." Journal of Fixed Income 7, no. 3 (December 31, 1997): 67–71. http://dx.doi.org/10.3905/jfi.1997.408212.
Full textZhang, Li Hua, Li Ping Zhang, and Er Fei Bai. "Generalized Elliptic Curve Digital Signature Chain Based Authentication and Key Agreement Scheme." Advanced Materials Research 108-111 (May 2010): 1503–8. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.1503.
Full textSugumar, B., and M. Ramakrishnan. "Key Escrow with Elliptic Curve Cryptography – Conceptual Framework for Distributed Mobile Networks." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 3 (September 1, 2018): 1060. http://dx.doi.org/10.11591/ijeecs.v11.i3.pp1060-1067.
Full textAnandakumar, N. Nalla, M. Prem Laxman Das, Somitra K. Sanadhya, and Mohammad S. Hashmi. "Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve." ACM Transactions on Reconfigurable Technology and Systems 11, no. 2 (November 12, 2018): 1–19. http://dx.doi.org/10.1145/3231743.
Full textAsif, Shahzad, Md Selim Hossain, and Yinan Kong. "High‐throughput multi‐key elliptic curve cryptosystem based on residue number system." IET Computers & Digital Techniques 11, no. 5 (July 27, 2017): 165–72. http://dx.doi.org/10.1049/iet-cdt.2016.0141.
Full textLi, Xiangxue, Haifeng Qian, and Yuan Zhou. "Pitfalls in identity based encryption using an elliptic curve combined public key." Applied Mathematics Letters 25, no. 8 (August 2012): 1111–13. http://dx.doi.org/10.1016/j.aml.2012.02.013.
Full textRawat, Arjun, and Maroti Deshmukh. "Tree and elliptic curve based efficient and secure group key agreement protocol." Journal of Information Security and Applications 55 (December 2020): 102599. http://dx.doi.org/10.1016/j.jisa.2020.102599.
Full textHuang, Shuai Jun, Jian Wu, and Yan Ping Du. "Key Parameter Function of Wine Cushioning Package of Honeycomb Paper Core." Advanced Materials Research 821-822 (September 2013): 1135–40. http://dx.doi.org/10.4028/www.scientific.net/amr.821-822.1135.
Full textLiu, Shu Qun, and Kun Sun. "Hand-Painted Curve Fitting Method Based on NURBS Curve." Advanced Materials Research 1049-1050 (October 2014): 1385–88. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1385.
Full textTang, Jing Qiu, and Yan Bin Cui. "High Voltage Breaker Cam Actuator’s Optimization Design on the Virtual Prototype Technology." Key Engineering Materials 419-420 (October 2009): 97–100. http://dx.doi.org/10.4028/www.scientific.net/kem.419-420.97.
Full textKumar, Abhimanyu, and Sachin Tripathi. "Ternary Tree based Group Key Agreement Protocol Over Elliptic Curve for Dynamic Group." International Journal of Computer Applications 86, no. 7 (January 16, 2014): 17–25. http://dx.doi.org/10.5120/14997-3072.
Full textIyengar, Vinay S. "Novel Elliptic Curve Scalar Multiplication Algorithms for Faster and Safer Public-Key Cryptosystems." International Journal on Cryptography and Information Security 2, no. 3 (September 30, 2012): 57–66. http://dx.doi.org/10.5121/ijcis.2012.2305.
Full text