Peeran et al., 2022 - Google Patents
E-governance security via public key cryptography using elliptic curve cryptographyPeeran et al., 2022
- Document ID
- 14995150234278203213
- Author
- Peeran M
- Shanavas A
- Publication year
- Publication venue
- Materials Today: Proceedings
External Links
Snippet
Abstract “In the current long stretches of worldwide financial emergency the Government of the non-industrial nations like India are confronting extreme test in keeping an effective organization in its center and associated areas inside a moderate spending plan. The …
- 238000000034 method 0 abstract description 9
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kearney et al. | Vulnerability of blockchain technologies to quantum attacks | |
US10547446B2 (en) | Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items | |
US11856099B2 (en) | Cryptographic pseudonym mapping method, computer system, computer program and computer-readable medium | |
Courtois et al. | Speed optimizations in Bitcoin key recovery attacks | |
CN111291122B (en) | Bidding method and device based on block chain | |
Ackerman et al. | Privacy and security issues in e-commerce | |
US11741242B2 (en) | Cryptographic pseudonym mapping method, computer system computer program and computer-readable medium | |
Peeran et al. | E-governance security via public key cryptography using elliptic curve cryptography | |
Hu et al. | Verifying privacy-preserving financing orders on a consortium blockchain based on zk-snarks | |
Belej | The cryptography of elliptical curves application for formation of the electronic digital signature | |
Singelée et al. | Secure e-commerce using mobile agents on untrusted hosts | |
Mohideen AbdulKader et al. | Privacy challenges and enhanced protection in blockchain using erasable ledger mechanism | |
Ezziri et al. | A zero-knowledge identification scheme based on the discrete logarithm problem and elliptic curves | |
Ahubele et al. | Towards a scalable and secure blockchain based on post-quantum cryptography | |
Barman et al. | E-Governance Security using Public Key Cryptography with special focus on ECC | |
Kotzanikolaou et al. | Dynamic multi-signatures for secure autonomous agents | |
Butler et al. | Decrypting Crypto: Cryptocurrencies and the Quantum Computer Threat | |
Jovanović et al. | Contemporary cryptography: Recent achievement and research perspectives | |
Dhiviyal et al. | Enhanced Cloud Security Implementation using Modified ECC Algorithm | |
Felista Sugirtha Lizy et al. | Performance of RSA Algorithm Using Game Theory for Aadhaar Card | |
Au et al. | Care, Custody, & Control (CCC): Identification, quantification, and mitigation of cryptocurrency custodial risk | |
HK40067163B (en) | Cryptographic pseudonym mapping method, computer system, computer program and computer-readable medium | |
Seito | Cryptography and Financial Industry | |
Sangoro et al. | Enhancement of Security in RFID using RSA Algorithm | |
Han et al. | Secure e-transactions protocol using intelligent mobile agents with fair privacy |