Elliptic Curve Cryptography (ECC)

In Press
Tarun Kumar, Prabhat Kumar, Suyel Namasudra (In Press). "User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment", International Journal of Interactive Multimedia and Artificial Intelligence, vol. In press, issue In press, no. In press, pp. 1-10. https://doi.org/10.9781/ijimai.2024.05.001
2020
Dawit Dejene, Basant Tiwari, Vivek Tiwari (2020). "TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, issue Regular Issue, no. 4, pp. 146-156. https://doi.org/10.9781/ijimai.2020.10.002