Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks
The Internet of Things (IoT) depicts a giant network where every “thing” can be interconnected through the communication network. The communication can be initiated between people-people, people-things, and things-things. Meanwhile, the fifth generation (5G) mobile communicating systems are the main...
| Main Authors: | Khan, A.S., Johari, Abdullah, Khan, N., Julahi, A.A., Tarmizi, S. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJCSNS
2017
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/17233/ http://ir.unimas.my/id/eprint/17233/1/Quantum-Elliptic%20curve%20Cryptography%20for%20Multihop%20Communication%20in%205G%20Networks%20%28abstract%29.pdf |
Similar Items
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Key exchange in elliptic curve cryptography based on the decomposition problem
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Elliptical curve cryptography-kerberos authentication model for keystone in open stack
by: Shamugam, V., et al.
Published: (2017)
by: Shamugam, V., et al.
Published: (2017)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
New quintupling point arithmetic 5P formulas for Lŏpez-Dahab coordinate over binary elliptic curve cryptography
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
by: Hilyati Hanina, Zazali
Published: (2012)
by: Hilyati Hanina, Zazali
Published: (2012)
Security issues in 5G device to device communication
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
by: Adnan, Shahid Khan
Published: (2014)
by: Adnan, Shahid Khan
Published: (2014)
QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Quantum communication and metrology in curved spacetime
by: Kohlrus, Jan
Published: (2019)
by: Kohlrus, Jan
Published: (2019)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Cluster-based multihop synchronization scheme for femtocell network
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2012)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2012)
Modeling of relay deployment in multihop relay network
by: Al-Dooghachi, Milad M. Ali Salih
Published: (2014)
by: Al-Dooghachi, Milad M. Ali Salih
Published: (2014)
Quantum Chaotic Cryptography : A New Approach
by: Akhshani, Afshin
Published: (2015)
by: Akhshani, Afshin
Published: (2015)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahar, Nur Shahirah, et al.
Published: (2023)
by: Azahar, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Opticalb Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Numerical modular symbols for elliptic curves
by: Wuthrich, Christian
Published: (2017)
by: Wuthrich, Christian
Published: (2017)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
On computing the reliability of opportunistic multihop networks with Mobile relays
by: Khanna, G., et al.
Published: (2019)
by: Khanna, G., et al.
Published: (2019)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
WiMAX multihop-relay
by: Saeed, Rashid Abdelhaleem
Published: (2011)
by: Saeed, Rashid Abdelhaleem
Published: (2011)
Cooperation stimulation mechanisms for wireless multihop networks: a survey
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2015)
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2015)
Similar Items
-
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014) -
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002) -
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018) -
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010) -
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)