[go: up one dir, main page]

Peeran et al., 2022 - Google Patents

E-governance security via public key cryptography using elliptic curve cryptography

Peeran et al., 2022

Document ID
14995150234278203213
Author
Peeran M
Shanavas A
Publication year
Publication venue
Materials Today: Proceedings

External Links

Snippet

Abstract “In the current long stretches of worldwide financial emergency the Government of the non-industrial nations like India are confronting extreme test in keeping an effective organization in its center and associated areas inside a moderate spending plan. The …
Continue reading at www.sciencedirect.com (other versions)

Similar Documents

Publication Publication Date Title
Kearney et al. Vulnerability of blockchain technologies to quantum attacks
US10547446B2 (en) Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items
US11856099B2 (en) Cryptographic pseudonym mapping method, computer system, computer program and computer-readable medium
Courtois et al. Speed optimizations in Bitcoin key recovery attacks
CN111291122B (en) Bidding method and device based on block chain
Ackerman et al. Privacy and security issues in e-commerce
US11741242B2 (en) Cryptographic pseudonym mapping method, computer system computer program and computer-readable medium
Peeran et al. E-governance security via public key cryptography using elliptic curve cryptography
Hu et al. Verifying privacy-preserving financing orders on a consortium blockchain based on zk-snarks
Belej The cryptography of elliptical curves application for formation of the electronic digital signature
Singelée et al. Secure e-commerce using mobile agents on untrusted hosts
Mohideen AbdulKader et al. Privacy challenges and enhanced protection in blockchain using erasable ledger mechanism
Ezziri et al. A zero-knowledge identification scheme based on the discrete logarithm problem and elliptic curves
Ahubele et al. Towards a scalable and secure blockchain based on post-quantum cryptography
Barman et al. E-Governance Security using Public Key Cryptography with special focus on ECC
Kotzanikolaou et al. Dynamic multi-signatures for secure autonomous agents
Butler et al. Decrypting Crypto: Cryptocurrencies and the Quantum Computer Threat
Jovanović et al. Contemporary cryptography: Recent achievement and research perspectives
Dhiviyal et al. Enhanced Cloud Security Implementation using Modified ECC Algorithm
Felista Sugirtha Lizy et al. Performance of RSA Algorithm Using Game Theory for Aadhaar Card
Au et al. Care, Custody, & Control (CCC): Identification, quantification, and mitigation of cryptocurrency custodial risk
HK40067163B (en) Cryptographic pseudonym mapping method, computer system, computer program and computer-readable medium
Seito Cryptography and Financial Industry
Sangoro et al. Enhancement of Security in RFID using RSA Algorithm
Han et al. Secure e-transactions protocol using intelligent mobile agents with fair privacy