-
1Academic Journal
المؤلفون: Khaista Rahman, Muhammad Asghar Khan, Fatemeh Afghah, Gordana Barb, Nisreen Innab, Tanveer Ahmed Cheema
المصدر: IEEE Access, Vol 12, Pp 62750-62764 (2024)
مصطلحات موضوعية: UAVs, security, authentication, access control, intrusion detection, hyperelliptic curve cryptography, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
2Academic JournalA Certificate-Based Ring Signcryption Scheme for Securing UAV-Enabled Private Edge Computing Systems
المؤلفون: Muhammad Asghar Khan, Insaf Ullah, Neeraj Kumar, Fatemeh Afghah, Gordana Barb, Fazal Noor, Saad Alqahtany
المصدر: IEEE Access, Vol 12, Pp 83466-83479 (2024)
مصطلحات موضوعية: Cloud computing security, private edge computing, unmanned aerial vehicles, cryptography, hyperelliptic curve cryptography, ring signcryption, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
3Book
المؤلفون: Al-Samhouri, Mohamad, Novas Castellano, Nuria, Aburrous, Maher, Gazquez Parra, Jose Antonio
مصطلحات موضوعية: wireless sensor network (WSN), authentication, Supersingular Hyperelliptic curve cryptography (HECC), post-quantum cryptographypublic key infrastructure (PKI)
Relation: https://doi.org/10.5772/intechopen.1005806; oai:zenodo.org:14217821
-
4Academic Journal
المؤلفون: Junaid Khan, Congxu Zhu, Wajid Ali, Muhammad Asim, Sadique Ahmad
المصدر: Information, Vol 15, Iss 5, p 282 (2024)
مصطلحات موضوعية: Internet of Things, security, hyperelliptic curve cryptography, discrete logarithm problem, signcryption, AVISPA, Information technology, T58.5-58.64
Relation: https://www.mdpi.com/2078-2489/15/5/282; https://doaj.org/toc/2078-2489; https://doaj.org/article/9da3288183a24ff085285ee8e9a3e497
-
5Academic Journal
المؤلفون: Asad Iqbal, Muhammad Zubair, Muhammad Asghar Khan, Insaf Ullah, Ghani Ur-Rehman, Alexey V. Shvetsov, Fazal Noor
المصدر: Future Internet; Volume 15; Issue 8; Pages: 266
مصطلحات موضوعية: vehicular ad hoc network, security, certificateless aggregate signature, hyperelliptic curve cryptography
وصف الملف: application/pdf
Relation: https://dx.doi.org/10.3390/fi15080266
الاتاحة: https://doi.org/10.3390/fi15080266
-
6Academic Journal
المصدر: Sensors; Volume 23; Issue 12; Pages: 5419
مصطلحات موضوعية: internet of things, telecare medicine information system, smart card, mutual authentication, hyperelliptic curve cryptography
وصف الملف: application/pdf
Relation: Internet of Things; https://dx.doi.org/10.3390/s23125419
الاتاحة: https://doi.org/10.3390/s23125419
-
7Academic Journal
المؤلفون: Muhammad Asghar Khan, Hosam Alhakami, Insaf Ullah, Wajdi Alhakami, Syed Agha Hassnain Mohsan, Usman Tariq, Nisreen Innab
المصدر: Drones; Volume 7; Issue 5; Pages: 321
مصطلحات موضوعية: drones, security, proxy signcryption, hyperelliptic curve cryptography, random oracle model, 5G
وصف الملف: application/pdf
Relation: Drone Communications; https://dx.doi.org/10.3390/drones7050321
-
8Academic Journal
المؤلفون: Tahir Ali Shah, Insaf Ullah, Muhammad Asghar Khan, Pascal Lorenz, Nisreen Innab
المصدر: Journal of Sensor and Actuator Networks; Volume 12; Issue 1; Pages: 10
مصطلحات موضوعية: IoT, certificateless forward-secure signature, hyperelliptic curve cryptography, ROM
وصف الملف: application/pdf
Relation: https://dx.doi.org/10.3390/jsan12010010
الاتاحة: https://doi.org/10.3390/jsan12010010
-
9Academic Journal
المؤلفون: Insaf Ullah, Muhammad Asghar Khan, Ako Muhammad Abdullah, Fazal Noor, Nisreen Innab, Chien-Ming Chen
المصدر: Sensors; Volume 23; Issue 3; Pages: 1121
مصطلحات موضوعية: WBANs, Fifth Generation (5G), Hyperelliptic Curve Cryptography (HECC), heterogeneous cryptography, authentications
وصف الملف: application/pdf
Relation: Internet of Things; https://dx.doi.org/10.3390/s23031121
الاتاحة: https://doi.org/10.3390/s23031121
-
10Academic Journal
المؤلفون: Usman Ali, Mohd Yamani Idna Bin Idris, Mohamad Nizam Bin Ayub, Insaf Ullah, Ihsan Ali, Tarak Nandy, Muktar Yahuza, Nauman Khan
المصدر: IEEE Access, Vol 9, Pp 49942-49959 (2021)
مصطلحات موضوعية: Hyperelliptic curve cryptography, RFID, authentication protocol, AVISPA, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
11Academic Journal
المؤلفون: Sana Javed, Muhammad Asghar Khan, Ako Muhammad Abdullah, Amjad Alsirhani, Abdullah Alomari, Fazal Noor, Insaf Ullah
المصدر: Drones; Volume 6; Issue 10; Pages: 264
مصطلحات موضوعية: Internet of Drones, blockchain, Certificate Authority, Elliptic Curve Cryptography, Hyperelliptic Curve Cryptography, security, privacy, public key cryptography
وصف الملف: application/pdf
Relation: Drone Communications; https://dx.doi.org/10.3390/drones6100264
-
12Book
المؤلفون: Vitse, Vanessa
المساهمون: Institut Fourier (IF), Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes 2016-2019 (UGA 2016-2019 )
المصدر: Arithmetic, Geometry, Cryptography and Coding Theory ; https://hal.science/hal-01981587 ; Arithmetic, Geometry, Cryptography and Coding Theory, AMS, 2017, Contemporary Mathematics
مصطلحات موضوعية: index calculus, divisor class group, hyperelliptic curve cryptography, discrete logarithm problem, Jacobian variety, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [MATH.MATH-NT]Mathematics [math]/Number Theory [math.NT]
-
13Academic Journal
المؤلفون: Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 1 (2018)
مصطلحات موضوعية: Diffie-Hellman key exchange, hyperelliptic curve cryptography, Kummer surface, FPGA, Zynq, low-latency, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
14Academic Journal
المؤلفون: Koppermann, Philipp, De Santis, Fabrizio, Heyszl, Johann, Sigl, Georg
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Volume 2018, Issue 1; 1-17 ; 2569-2925
مصطلحات موضوعية: Diffie-Hellman key exchange, hyperelliptic curve cryptography, Kummer surface, FPGA, Zynq, low-latency, high-throughput, fault countermeasure
وصف الملف: application/pdf
-
15
المصدر: IETE Journal of Research. :1-12
مصطلحات موضوعية: Password, business.industry, Computer science, Computer Science Applications, Theoretical Computer Science, Diffie–Hellman key exchange, Authenticated Key Exchange, Key (cryptography), Hyperelliptic curve cryptography, Electrical and Electronic Engineering, Latency (engineering), business, Hyperelliptic curve, Edge computing, Computer network
-
16Conference
المؤلفون: Renes, Joost, Schwabe, Peter, Smith, Benjamin, Batina, Lejla
المساهمون: Digital Security Group Nijmegen, Institute for Computing and Information Sciences Nijmegen (ICIS), Radboud University Nijmegen -Radboud University Nijmegen, Laboratoire d'informatique de l'École polytechnique Palaiseau (LIX), École polytechnique (X), Institut Polytechnique de Paris (IP Paris)-Institut Polytechnique de Paris (IP Paris)-Centre National de la Recherche Scientifique (CNRS), Geometry, arithmetic, algorithms, codes and encryption (GRACE), Institut Polytechnique de Paris (IP Paris)-Institut Polytechnique de Paris (IP Paris)-Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X), Institut Polytechnique de Paris (IP Paris)-Institut Polytechnique de Paris (IP Paris)-Centre National de la Recherche Scientifique (CNRS)-Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), IACR
المصدر: Lecture Notes in Computer Science ; Cryptographic Hardware and Embedded Systems – CHES 2016 ; https://inria.hal.science/hal-01300727 ; Cryptographic Hardware and Embedded Systems – CHES 2016, IACR, Aug 2016, Santa Barbara, United States. pp.20, ⟨10.1007/978-3-662-53140-2_15⟩
مصطلحات موضوعية: Hyperelliptic curve cryptography, AVR ATmega, ARM Cortex M0, Kummer surface, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
جغرافية الموضوع: Santa Barbara, United States
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1604.06059; hal-01300727; https://inria.hal.science/hal-01300727; https://inria.hal.science/hal-01300727/document; https://inria.hal.science/hal-01300727/file/mukummer.pdf; ARXIV: 1604.06059
-
17Conference
المؤلفون: Chung, Ping Ngai, Costello, Craig, Smith, Benjamin
المساهمون: University of Chicago, Microsoft Research Redmond, Microsoft Corporation Redmond, Wash., Geometry, arithmetic, algorithms, codes and encryption (GRACE), Laboratoire d'informatique de l'École polytechnique Palaiseau (LIX), École polytechnique (X), Institut Polytechnique de Paris (IP Paris)-Institut Polytechnique de Paris (IP Paris)-Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X), Institut Polytechnique de Paris (IP Paris)-Institut Polytechnique de Paris (IP Paris)-Centre National de la Recherche Scientifique (CNRS)-Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Institut Polytechnique de Paris (IP Paris)-Institut Polytechnique de Paris (IP Paris)-Centre National de la Recherche Scientifique (CNRS)
المصدر: Selected Areas in Cryptography - SAC 2016 ; https://inria.hal.science/hal-01353480 ; Selected Areas in Cryptography - SAC 2016, Aug 2016, St John's, Canada. pp.18, ⟨10.1007/978-3-319-69453-5_25⟩
مصطلحات موضوعية: Kummer surface, genus 2, scalar multiplication, signatures, pseudomultiplication, uniform, constant-time, hyperelliptic curve cryptography, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
جغرافية الموضوع: St John's
Time: St John's, Canada
Relation: hal-01353480; https://inria.hal.science/hal-01353480; https://inria.hal.science/hal-01353480/document; https://inria.hal.science/hal-01353480/file/recovery.pdf
-
18
المؤلفون: Karthik Srinivasan, B. Prasanalakshmi, Shermin Shamsudheen, S. Shridevi, Yu-Chen Hu, K. Murugan
المصدر: The Journal of Supercomputing. 78:361-378
مصطلحات موضوعية: 020203 distributed computing, Authentication, Steganography, business.industry, Computer science, Cryptography, Data_CODINGANDINFORMATIONTHEORY, 02 engineering and technology, Encryption, Theoretical Computer Science, DICOM, Transmission (telecommunications), Computer engineering, Hardware and Architecture, 0202 electrical engineering, electronic engineering, information engineering, Hyperelliptic curve cryptography, business, Software, Information Systems, Data transmission
-
19
المؤلفون: Ihsan Ali, Nauman Khan, Mohamad Nizam Ayub, Mohd Yamani Idna Idris, Insaf Ullah, Tarak Nandy, Usman Ali, Muktar Yahuza
المصدر: IEEE Access, Vol 9, Pp 49942-49959 (2021)
مصطلحات موضوعية: RFID, 020203 distributed computing, Authentication, General Computer Science, Computer science, business.industry, Hyperelliptic curve cryptography, General Engineering, 020206 networking & telecommunications, Cryptography, 02 engineering and technology, Internet security, Embedded system, authentication protocol, 0202 electrical engineering, electronic engineering, information engineering, Overhead (computing), Radio-frequency identification, General Materials Science, AVISPA, lcsh:Electrical engineering. Electronics. Nuclear engineering, Elliptic curve cryptography, business, lcsh:TK1-9971, Signcryption
-
20
المؤلفون: K. Sathya, Vani Rajasekar, J. Premalatha
المصدر: Wireless Communications and Mobile Computing, Vol 2020 (2020)
مصطلحات موضوعية: Technology, Authentication, Article Subject, Biometrics, Computer Networks and Communications, business.industry, Computer science, Iris recognition, Feature extraction, 020207 software engineering, Pattern recognition, Cryptography, TK5101-6720, 02 engineering and technology, Encryption, Gabor filter, Telecommunication, 0202 electrical engineering, electronic engineering, information engineering, Hyperelliptic curve cryptography, 020201 artificial intelligence & image processing, Artificial intelligence, Electrical and Electronic Engineering, business, Information Systems
وصف الملف: text/xhtml