An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elliptic Curve Cryptography for Securing Payment System

Mobile payment system has made it easy for people to do financial transaction. However, its security is still a concern. It needs to protect the data transferred between parties involved in the system. In this paper, we investigate the possibility use of elliptic curve cryptography to secure the data transferred in a payment system.

متن کامل

A Novel Elliptic Curve Cryptography Based Aodv for Mobile Ad-hoc Networks for Enhanced Security

The all-pervading nature of communication networks has paved the way for the development of wireless and internet applications, making communication possible all over the world. With the explosion of networks and the huge amount of data transmitted along, securing the data content is becoming more and more important. Mobile ad hoc networks are multi hop wireless networks without fixed infrastru...

متن کامل

Elliptic curve cryptography in cloud computing security

Cloud computing is a technological advancement that has been growing swiftly during the last decade. In simple terms, cloud computing is a technology that enables shared, remote, on-demand and ubiquitous access to services through the Internet. It enables consumers to access applications and services that reside on remote servers, without having to allocate large amounts of storage space on the...

متن کامل

Implementing Network Security Protocols based on Elliptic Curve Cryptography

Elliptic curve cryptography provides a methodology for obtaining high-speed, efficient, and scalable implementations of network security protocols. In this paper, we describe in detail three protocols based on elliptic curve cryptographic techniques, and the results of our implementation of the elliptic curve cryptography over the Galois field GF (2k), where k is a composite number. 1 Elliptic ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SN Computer Science

سال: 2020

ISSN: 2662-995X,2661-8907

DOI: 10.1007/s42979-020-00122-1