Elliptical curve cryptography-kerberos authentication model for keystone in open stack
© Springer Nature Singapore Pte Ltd. 2017. Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStac...
| Main Authors: | Shamugam, V., Murray, Iain, Sidhu, Amandeep |
|---|---|
| Format: | Conference Paper |
| Published: |
2017
|
| Online Access: | http://hdl.handle.net/20.500.11937/57855 |
Similar Items
Software defined networking challenges and future direction: A case study of implementing SDN features on OpenStack private cloud
by: Shamugam, V., et al.
Published: (2016)
by: Shamugam, V., et al.
Published: (2016)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Key exchange in elliptic curve cryptography based on the decomposition problem
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Efficient mutual authentication using kerberos for resource constraint smart meter in advanced metering infrastructure
by: Hasan, Md Mehedi, et al.
Published: (2023)
by: Hasan, Md Mehedi, et al.
Published: (2023)
A new elliptic curve cryptographic system over the finite fields
by: Priyatharsan, U., et al.
Published: (2017)
by: Priyatharsan, U., et al.
Published: (2017)
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
by: Hilyati Hanina, Zazali
Published: (2012)
by: Hilyati Hanina, Zazali
Published: (2012)
New quintupling point arithmetic 5P formulas for Lŏpez-Dahab coordinate over binary elliptic curve cryptography
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
The ecology of a keystone seed disperser, the ant Rhytidoponera violacea
by: Lubertazzi, D., et al.
Published: (2010)
by: Lubertazzi, D., et al.
Published: (2010)
Numerical modular symbols for elliptic curves
by: Wuthrich, Christian
Published: (2017)
by: Wuthrich, Christian
Published: (2017)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
A keystone ant species promotes seed dispersal in a "diffuse" mutualism
by: Majer, Jonathan, et al.
Published: (2007)
by: Majer, Jonathan, et al.
Published: (2007)
Vanishing of some Galois cohomology groups for elliptic curves
by: Lawson, Tyler, et al.
Published: (2016)
by: Lawson, Tyler, et al.
Published: (2016)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
High performance methods of elliptic curve scalar multiplication
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Improved arithmetic on elliptic curves over prime field
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Addition chain heuristics in application to elliptic curve cryptosystems
by: Mohamed, Mohamad Afendee, et al.
Published: (2024)
by: Mohamed, Mohamad Afendee, et al.
Published: (2024)
Elliptic net scalar multiplication upon Koblitz curves
by: Muslim, Norliana, et al.
Published: (2020)
by: Muslim, Norliana, et al.
Published: (2020)
Tripling formulae of elliptic curve over binary field in Lopez-Dahab model
by: Md Yasin, Sharifah, et al.
Published: (2015)
by: Md Yasin, Sharifah, et al.
Published: (2015)
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
by: Muslim, Norliana
Published: (2022)
by: Muslim, Norliana
Published: (2022)
On the design of projective binary Edwards elliptic curves over GF (p) benefitting from mapping elliptic curves computation to variable degree of parallel design
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
Modular forms and elliptic curves over imaginary
quadratic fields
by: Lingham, Mark Peter
Published: (2005)
by: Lingham, Mark Peter
Published: (2005)
K1-congruences between L-values of elliptic curves
by: Ward, Thomas
Published: (2009)
by: Ward, Thomas
Published: (2009)
Terras (Eusideroxylon zwageri Teijsm. & Binn.), a Cultural Keystone Species of the Berawan People of Sarawak, Malaysia
by: Franco, F, et al.
Published: (2014)
by: Franco, F, et al.
Published: (2014)
Saturation of Mordell-Weil Groups of Elliptic Curves over Number Fields
by: Prickett, Martin
Published: (2004)
by: Prickett, Martin
Published: (2004)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
Similar Items
-
Software defined networking challenges and future direction: A case study of implementing SDN features on OpenStack private cloud
by: Shamugam, V., et al.
Published: (2016) -
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014) -
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002) -
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018) -
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)