ECC
15 Followers
Recent papers in ECC
Security of the consumer’s data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security... more
The modern world is experiencing multimedia and internet usage techniques. As, image data distribution is increasing, the security risks and threats are also coming into picture. To avoid the risks and to make the transmission of images... more
Enhancing concrete by adding different types of suitable materials is a very attractive field within concrete research society. The use of waste tires was introduced into concrete to reduce its brittle nature and its loading toughness.... more
In today's period of the invasive figuring, the Internet has turned into the principle method of information correspondence. In such a situation, giving security to information turns into a mind boggling assignment. In Elliptic bend... more
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three... more
Technological advancements in cloud computing due to increased connectivity and exponentially proliferating data has resulted in migration towards cloud architecture. Cloud computing is technology where the users' can use high end... more
This paper proposes a method for designing a new ultra wide band (UWB) multiple-input multiple-output (MIMO) antenna with two and four elements. First we presented an ultra-wide band antenna we studied these performances. Then, we studied... more
Mobile payment system is defined as mobile money transfer and mobile wallet. It is also defined as an electronic payment method. Moreover, Mobile payment has been generated to be an attractive alternative for the traditional payments... more
Technological advancements in cloud computing due to increased connectivity and exponentially proliferating data has resulted in migration towards cloud architecture. Cloud computing is technology where the users' can use high end... more
Currently protection codes are essential to memory cells using to maintain a good reliability, various error detection and error correction methods can be used but to avoid corruption data Error correction code (ECC) are mostly widely... more
Wireless Sensor Networks (WSNs) has foreseen big changes in data gathering, processing and disseminating for monitoring specific applications such as emergency services, disaster management, and military applications etc. Since large... more
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
In today's period of the invasive figuring, the Internet has turned into the principle method of information correspondence. In such a situation, giving security to information turns into a mind boggling assignment. In Elliptic bend... more
Concrete with adequately soaring compressive strength has been in use for building skyscrapers, pavements, two-dimensional elements like plates and slab-decks, threedimensional solid masses like retaining walls and dams. However, majority... more
The transmission of digital image data now a day's become a routine and necessity of our society .The amount of digital medical data is increasing rapidly on internet. Now it is become necessity of the secure and reliable digital image... more
The security of data become a major issue in the present days, there are different dimensions of security in this paper we will discuss one of the major properties of security. The signcryption is one of the techniques to secure your data... more
The growing area of lightweight devices, such as mobile cell phones, PDA … conduct to the rapid growth of mobile networks, they are playing important role in everyone's day. Mobile Networks offer unrestricted mobility and tender important... more
To protect user privacy in profile-based PWS, propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. It has to consider two contradicting effects during... more
Many problems associated with the use of normal weight concrete have been solved with the development of structural ultra-lightweight engineered cementitious composite (SULWECC) that has the capability to exhibit strain-hardening behavior... more
Enhancing concrete by adding dif erent types of suitable materials is a very attractive field within concrete research society. The use of waste tires was introduced into concrete to reduce its brittle nature and its loading toughness.... more
The modern world is experiencing multimedia and internet usage techniques. As, image data distribution is increasing, the security risks and threats are also coming into picture. To avoid the risks and to make the transmission of images... more
The use of fiber reinforced polymer (FRP) reinforcement in structural engineering has attracted great attention due to high tensile strength, good fatigue performance and inherent corrosion resistance. Engineered cementitious composite... more
The wide use of vehicular ad hoc networks (VANETs) in the last decade has led many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However,... more
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
This paper proposes a method for designing a new ultra wide band (UWB) multiple-input multiple-output (MIMO) antenna with two and four elements. First we presented an ultra-wide band antenna we studied these performances. Then, we studied... more
In this paper, the problem of robust fractional-order observer (RFO) design in time and frequency domains for disturbed fractional-order system is investigated. The main results include the formulation of robust observer design problems... more
Smart Governance is the process of utilizing modern technology to create a transparent and sustainable environment for citizens and the government. Intelligence through smart governance is utilized to upgrade decision making through a... more
A recent development in the adhoc network is a vehicular network called VANET (Vehicular Adhoc Network). Intelligent Transportation System is the Intelligent application of VANET. Due to open nature of VANET attacker can launch various... more
A recent development in the adhoc network is a vehicular network called VANET (Vehicular Adhoc Network). Intelligent Transportation System is the Intelligent application of VANET. Due to open nature of VANET attacker can launch various... more
Key management plays a vital role in the data communications. The proposed scheme is a key management scheme that provides more efficient and secure methods for key generation and utilization. Enhanced and cost effective key management... more
The data encryption using digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the... more
The data encryption using digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the... more