Ваш любимый книжный интернет-магазин
Перейти на
GlavKniga.SU
Ваш город: Алматы
Ваше местоположение – Алматы
 Да 
От вашего выбора зависит время и стоимость доставки
Корзина: пуста
Авторизация 
  Логин
  
  Пароль
  
Регистрация  Забыли пароль?

Поиск по каталогу 
(строгое соответствие)
ISBN
Фраза в названии или аннотации
Автор
Язык книги
Год издания
с по
Электронный носитель
Тип издания
Вид издания
Отрасли экономики
Отрасли знаний
Сферы деятельности
Надотраслевые технологии
Разделы каталога
худ. литературы

Elliptic Curve Cryptography: Implementation Issues. Key Establishment Protocol

В наличии
Местонахождение: АлматыСостояние экземпляра: новый
Бумажная
версия
Автор: Dr.Sonali Ridhorkar
ISBN: 9786203929997
Год издания: 1905
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 152
Издательство: LAP LAMBERT Academic Publishing
Цена: 37125 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:
Код товара: 714128
Способы доставки в город Алматы *
комплектация (срок до отгрузки) не более 2 рабочих дней
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK)
Курьерская доставка CDEK из города Москва
Доставка Почтой России из города Москва
      Аннотация: Recently numerous IBC (Identity Based Cryptography) based authentic key establishment procedure constructed on the top of the usage of ECC (Elliptic Curve Cryptography) suggested and proposed. Such key agreement/establishment protocols that are vulnerable to many active attacks and passive attacks such as temporary information attack (session-specific), session key- off-set attack etc. Planned approach provides authenticated key exchange between the communicating parties by sending the secret information approve on the session key which is used for secret communication. The main focus of proposed methodology for mobile devices considering as nodes for machine to machine communication for Internet on things (IoT). In wireless communication, when number of nodes are involved in the communication then there is chance of reveal of information. This is because the nodes available in the network are not trusted node and they can leak the secret information. So the secret information from sender to receiver node is not secure, such schemes are useful for limited computing devices (constrained devices) such as smart phone, smart cards, wireless sensor node, PDA’s .
Ключевые слова: Authenticated Key Agreement, Elliptic Curve Discrete Logarithm Problem, Elliptic Curve Cryptography, RSA, Authenticated Key Establishment
Похожие издания
Отрасли знаний: Точные науки -> Математика
Dr. Ankur Nehra
Some Vedic Mathematics Sutras for Elliptic Curve Cryptography. Some Efficient Computing Techniques of Ancient Indian Vedic Mathematics (AIVM) for Elliptic Curve Cryptography (ECC).
1905 г.,  340 стр.,  мягкий переплет
Ancient Indian Vedic Mathematics (AIVM) and Elliptic Curve Cryptography (ECC) are the fundamental branches of Mathematics, this book aims to serve as a reference book for researchers. It can also be read with great interest by students of engineering and UG & PG courses in mathematics and computer science. The book's material has been arranged...

60742 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
S. Karthika Jayaraman and M. Gobi
The Cloud Data Security using Elliptic Curve Cryptography. .
2018 г.,  108 стр.,  мягкий переплет
Cloud Computing is a boon to IT and related businesses. However security is the crucial and inevitable problem there. Though numerous solutions are there to protect the cloud data, still there is a lack. This is a step ahead to provide the required security for the data in the cloud. This methodology will provide considerable security over the...

29753 тг
Бумажная версия
Отрасли знаний: Точные науки -> Математика
Rishivarman Ramachandran
Elliptic Curve Cryptography-A Network Security. .
2017 г.,  144 стр.,  мягкий переплет
Cryptography is an interdisciplinary field of great practical importance. The subfield of public key cryptography has notable applications, such as digital signatures. The security of a public key cryptosystem depends on the difficulty of certain computational problems in mathematics . A deep understanding of the security and efficient...

33936 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Obaidur Rahaman
Data and Information Security by using Elliptic Curve Cryptography. .
2017 г.,  56 стр.,  мягкий переплет
This top-level data and information security policy is a key component of organisations overall data and information security by using elliptic cryptography and should be considered alongside more detailed data and information security documentation including, system level security policies, security guidance and protocols or procedures. Any of...

21130 тг
Бумажная версия
Отрасли знаний: Точные науки -> Математика
B. A. Kasuni Welihinda and R. Sanjeewa
Elliptic Curve Cryptography and Coding Theory. .
2017 г.,  116 стр.,  мягкий переплет
From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography...

21810 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Kshitija B. Chutke,Arif M. Khan and Rajendra Purohit
Comparative Analysis of Elliptic Curve Cryptography. .
2016 г.,  80 стр.,  мягкий переплет
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime...

21983 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Gunendra Bikram Bidari and Rabindra Bista
An Algorithmic Approach to Elliptic Curve Cryptography. .
2015 г.,  76 стр.,  мягкий переплет
The current research trend shows three categories of public-key cryptographic systems for the next generation that are efficient and secure. Based on the corresponding mathematical foundation, they are Elliptic Curve Cryptosystem, Integer Factorization Systems and Discrete Logarithm Systems. This thesis emphasizes in using the Cryptosystem based...

21841 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Satarupa Chakraborty,Subarna Laha and Ankana Dhar
GSM Security Using Elliptic Curve Cryptography. .
2013 г.,  164 стр.,  мягкий переплет
Elliptic curve cryptography , a new and most improved cryptographic algorithm of the era. This book concern about how efficiently one can imposed this algorithm in GSM network. Unlike any wired telephone network GSM is most widely used telephone network in which security is always a great issue. So this book contains detailed discussion about RSA...

40503 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Nizamud Din
Signcryption Schemes Based on Hyper Elliptic Curve Cryptography. .
2013 г.,  72 стр.,  мягкий переплет
Signcryption is an emerging cryptographic technique provides the functionality of digital signature and encryption with significant less cost. Hyperelliptic curve cryptography is on its way from pure academic interest to industrial applications due to its efficiency and high security per bit. In this book we present six signcryption schemes based...

28039 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Nivethaa Shree and Latha Parthiban
Elliptic Curve Cryptography for Digital Signature Authentication. Algorithm for Banking Applications.
2013 г.,  60 стр.,  мягкий переплет
Elliptic curve cryptosystem provides greater security for any key size, when compared to integer factorization and discrete logarithm system. Generally in digital signature scheme, signature (r, s) along with message will be sent to the receiver but in this approach, signature alone is sent and message will be recovered from signature. This...

27613 тг
Бумажная версия