Elliptic Curve Cryptography (ECC)

2024
Tarun Kumar, Prabhat Kumar, Suyel Namasudra (2024). "User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 9, issue Regular issue, no. 1, pp. 127-136. https://doi.org/10.9781/ijimai.2024.05.001
2020
Dawit Dejene, Basant Tiwari, Vivek Tiwari (2020). "TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, issue Regular Issue, no. 4, pp. 146-156. https://doi.org/10.9781/ijimai.2020.10.002