Skip to main content
Security of the consumer’s data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security... more
    • by 
    •   6  
      Computer ScienceSecurityDigital SignatureECC
The modern world is experiencing multimedia and internet usage techniques. As, image data distribution is increasing, the security risks and threats are also coming into picture. To avoid the risks and to make the transmission of images... more
    • by 
    •   7  
      Computer ScienceImage ProcessingEncryptionECC
Enhancing concrete by adding different types of suitable materials is a very attractive field within concrete research society. The use of waste tires was introduced into concrete to reduce its brittle nature and its loading toughness.... more
    • by 
    •   4  
      RecyclingECCCrumb RubberCivil Engineering Applications
In today's period of the invasive figuring, the Internet has turned into the principle method of information correspondence. In such a situation, giving security to information turns into a mind boggling assignment. In Elliptic bend... more
    • by 
    •   4  
      Elliptic curvesECCAttacksDiffie-Hellman-DSA
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three... more
    • by 
    •   12  
      Computer NetworksPerformanceCryptographyECDSA
Technological advancements in cloud computing due to increased connectivity and exponentially proliferating data has resulted in migration towards cloud architecture. Cloud computing is technology where the users' can use high end... more
    • by 
    •   2  
      CryptographyECC
This paper proposes a method for designing a new ultra wide band (UWB) multiple-input multiple-output (MIMO) antenna with two and four elements. First we presented an ultra-wide band antenna we studied these performances. Then, we studied... more
    • by 
    •   4  
      ECCMetamaterialIsolationDiversity gain
Mobile payment system is defined as mobile money transfer and mobile wallet. It is also defined as an electronic payment method. Moreover, Mobile payment has been generated to be an attractive alternative for the traditional payments... more
    • by 
    •   4  
      Computer ScienceCryptographyECCSteganography and Cryptography
Technological advancements in cloud computing due to increased connectivity and exponentially proliferating data has resulted in migration towards cloud architecture. Cloud computing is technology where the users' can use high end... more
    • by 
    •   2  
      CryptographyECC
Currently protection codes are essential to memory cells using to maintain a good reliability, various error detection and error correction methods can be used but to avoid corruption data Error correction code (ECC) are mostly widely... more
    • by 
    •   5  
      ERTECCSecDMC
Wireless Sensor Networks (WSNs) has foreseen big changes in data gathering, processing and disseminating for monitoring specific applications such as emergency services, disaster management, and military applications etc. Since large... more
    • by 
    •   7  
      Computer ScienceAuthenticationWsnECC
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
    • by 
    •   5  
      Computer ScienceCryptographyECCComputer Applications
In today's period of the invasive figuring, the Internet has turned into the principle method of information correspondence. In such a situation, giving security to information turns into a mind boggling assignment. In Elliptic bend... more
    • by 
    •   4  
      Elliptic curvesECCAttacksDiffie-Hellman-DSA
Concrete with adequately soaring compressive strength has been in use for building skyscrapers, pavements, two-dimensional elements like plates and slab-decks, threedimensional solid masses like retaining walls and dams. However, majority... more
    • by 
    •   4  
      ECCFly AshESEMStrain Hardening
The transmission of digital image data now a day's become a routine and necessity of our society .The amount of digital medical data is increasing rapidly on internet. Now it is become necessity of the secure and reliable digital image... more
    • by 
    •   3  
      ECCDICOMWater Marking
The security of data become a major issue in the present days, there are different dimensions of security in this paper we will discuss one of the major properties of security. The signcryption is one of the techniques to secure your data... more
    • by 
    •   3  
      ECCSigncryptionIJMER
The growing area of lightweight devices, such as mobile cell phones, PDA … conduct to the rapid growth of mobile networks, they are playing important role in everyone's day. Mobile Networks offer unrestricted mobility and tender important... more
    • by 
    •   10  
      Information SecuritySecurityComputer SecurityCryptography
To protect user privacy in profile-based PWS, propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. It has to consider two contradicting effects during... more
    • by 
    •   4  
      CryptographyECCElliptic Curve CryptographyIjcet Iaeme
Many problems associated with the use of normal weight concrete have been solved with the development of structural ultra-lightweight engineered cementitious composite (SULWECC) that has the capability to exhibit strain-hardening behavior... more
    • by 
    •   8  
      Civil EngineeringArchitectureMonte CarloReliability
Enhancing concrete by adding dif erent types of suitable materials is a very attractive field within concrete research society. The use of waste tires was introduced into concrete to reduce its brittle nature and its loading toughness.... more
    • by 
    •   5  
      RecyclingECCCrumb RubberCivil Engineering Applications
The modern world is experiencing multimedia and internet usage techniques. As, image data distribution is increasing, the security risks and threats are also coming into picture. To avoid the risks and to make the transmission of images... more
    • by 
    •   9  
      Computer ScienceImage ProcessingInformation SecurityCryptography
The use of fiber reinforced polymer (FRP) reinforcement in structural engineering has attracted great attention due to high tensile strength, good fatigue performance and inherent corrosion resistance. Engineered cementitious composite... more
    • by 
    •   7  
      Civil EngineeringStructural EngineeringFRPECC
The wide use of vehicular ad hoc networks (VANETs) in the last decade has led many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However,... more
    • by 
    •   5  
      AuthenticationVANETsECCInsider attacks
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
    • by 
    •   5  
      Computer ScienceCryptographyECCComputer Applications
This paper proposes a method for designing a new ultra wide band (UWB) multiple-input multiple-output (MIMO) antenna with two and four elements. First we presented an ultra-wide band antenna we studied these performances. Then, we studied... more
    • by 
    •   6  
      Computer ScienceECCMetamaterialIsolation
In this paper, the problem of robust fractional-order observer (RFO) design in time and frequency domains for disturbed fractional-order system is investigated. The main results include the formulation of robust observer design problems... more
    • by 
    •   14  
      Fractional Differential EquationsFractional Order Control SystemsFractional calculus and its applicationsLinear Matrix Inequalities
Smart Governance is the process of utilizing modern technology to create a transparent and sustainable environment for citizens and the government. Intelligence through smart governance is utilized to upgrade decision making through a... more
    • by 
    •   2  
      BigdataECC
A recent development in the adhoc network is a vehicular network called VANET (Vehicular Adhoc Network). Intelligent Transportation System is the Intelligent application of VANET. Due to open nature of VANET attacker can launch various... more
    • by 
    •   3  
      AuthenticationVanet SecurityECC
A recent development in the adhoc network is a vehicular network called VANET (Vehicular Adhoc Network). Intelligent Transportation System is the Intelligent application of VANET. Due to open nature of VANET attacker can launch various... more
    • by 
    •   3  
      AuthenticationVanet SecurityECC
Key management plays a vital role in the data communications. The proposed scheme is a key management scheme that provides more efficient and secure methods for key generation and utilization. Enhanced and cost effective key management... more
    • by 
    •   5  
      CryptographyECCMulticastKey Management
The data encryption using digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the... more
    • by 
    •   6  
      Digital SignatureEncryptionECCMD5
The data encryption using digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the... more
    • by 
    •   7  
      Digital SignatureEncryptionNetworkingECC
    • by 
    •   3  
      DSPECCDBNS