Matches in SemOpenAlex for { <https://semopenalex.org/work/W2922471325> ?p ?o ?g. }
Showing items 1 to 67 of
67
with 100 items per page.
- W2922471325 endingPage "135" @default.
- W2922471325 startingPage "130" @default.
- W2922471325 abstract "In recent days securing the data while transferring through electronic devices from one end to the other has became a challenging task to both sender and the receiver. During the transmission of private data over the electronic devices may be hacked some times by the hackers. The data can be secured by using the cryptographic concept. This paper is about how the data are protected while transferring the data from one electronics devices to another using the ECC algorithm. Cryptographic algorithms plays an important role in securing the data against malicious attacks. The main goal of cryptography is not only to secure data from being hacked or attacked also it can be used for authentication of users. There are two types of cryptographic algorithms namely Symmetric key cryptographic algorithms and Asymmetric key cryptographic algorithms. Symmetric key cryptographic algorithm uses the only one key for both encryption and decryption process, where as Asymmetric cryptographic algorithm uses two different keys for encrypting and decrypting the messages. The public key is made publicly available and can be used to encrypt messages. The private key is kept secret and can be used to decrypt the received messages. Nowadays, many electronic devices like electronic phones, tablets, personal computers are in the workplace for transferring the data. Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create privacy, integrity and confidentiality, faster, smaller, and more efficient cryptographic keys." @default.
- W2922471325 created "2019-03-22" @default.
- W2922471325 creator A5009881989 @default.
- W2922471325 creator A5072571123 @default.
- W2922471325 date "2019-03-01" @default.
- W2922471325 modified "2023-09-27" @default.
- W2922471325 title "Secure Transmission of Data through Electronic Devices using ECC Algorithm" @default.
- W2922471325 cites W2113267468 @default.
- W2922471325 cites W2120598334 @default.
- W2922471325 cites W2136471217 @default.
- W2922471325 cites W2148895443 @default.
- W2922471325 doi "https://doi.org/10.32628/cseit195223" @default.
- W2922471325 hasPublicationYear "2019" @default.
- W2922471325 type Work @default.
- W2922471325 sameAs 2922471325 @default.
- W2922471325 citedByCount "0" @default.
- W2922471325 crossrefType "journal-article" @default.
- W2922471325 hasAuthorship W2922471325A5009881989 @default.
- W2922471325 hasAuthorship W2922471325A5072571123 @default.
- W2922471325 hasBestOaLocation W29224713251 @default.
- W2922471325 hasConcept C11413529 @default.
- W2922471325 hasConcept C148730421 @default.
- W2922471325 hasConcept C15927051 @default.
- W2922471325 hasConcept C167615521 @default.
- W2922471325 hasConcept C178489894 @default.
- W2922471325 hasConcept C203062551 @default.
- W2922471325 hasConcept C26517878 @default.
- W2922471325 hasConcept C31258907 @default.
- W2922471325 hasConcept C33884865 @default.
- W2922471325 hasConcept C38652104 @default.
- W2922471325 hasConcept C41008148 @default.
- W2922471325 hasConcept C47750902 @default.
- W2922471325 hasConcept C65302260 @default.
- W2922471325 hasConcept C99674996 @default.
- W2922471325 hasConceptScore W2922471325C11413529 @default.
- W2922471325 hasConceptScore W2922471325C148730421 @default.
- W2922471325 hasConceptScore W2922471325C15927051 @default.
- W2922471325 hasConceptScore W2922471325C167615521 @default.
- W2922471325 hasConceptScore W2922471325C178489894 @default.
- W2922471325 hasConceptScore W2922471325C203062551 @default.
- W2922471325 hasConceptScore W2922471325C26517878 @default.
- W2922471325 hasConceptScore W2922471325C31258907 @default.
- W2922471325 hasConceptScore W2922471325C33884865 @default.
- W2922471325 hasConceptScore W2922471325C38652104 @default.
- W2922471325 hasConceptScore W2922471325C41008148 @default.
- W2922471325 hasConceptScore W2922471325C47750902 @default.
- W2922471325 hasConceptScore W2922471325C65302260 @default.
- W2922471325 hasConceptScore W2922471325C99674996 @default.
- W2922471325 hasLocation W29224713251 @default.
- W2922471325 hasOpenAccess W2922471325 @default.
- W2922471325 hasPrimaryLocation W29224713251 @default.
- W2922471325 hasRelatedWork W169051368 @default.
- W2922471325 hasRelatedWork W2067141628 @default.
- W2922471325 hasRelatedWork W2092408411 @default.
- W2922471325 hasRelatedWork W2162181331 @default.
- W2922471325 hasRelatedWork W2377131428 @default.
- W2922471325 hasRelatedWork W2766194456 @default.
- W2922471325 hasRelatedWork W3093625357 @default.
- W2922471325 hasRelatedWork W3130043982 @default.
- W2922471325 hasRelatedWork W3175527720 @default.
- W2922471325 hasRelatedWork W4281963727 @default.
- W2922471325 isParatext "false" @default.
- W2922471325 isRetracted "false" @default.
- W2922471325 magId "2922471325" @default.
- W2922471325 workType "article" @default.