2005
DOI: 10.3844/ajassp.2005.1232.1235
|View full text |Cite
|
Sign up to set email alerts
|

Key Exchange Protocol in Elliptic Curve Cryptography with No Public Point

Abstract: Abstract:In recent years some cryptographic algorithms have gained popularity due to properties that make them suitable for use in constrained environment like mobile information appliances, where computing resources and power availability are limited. One of these cryptosystems is Elliptic curve which requires less computational power, memory and communication bandwidth compared to other cryptosystem. This makes the elliptic curve cryptography to gain wide acceptance as an alternative to conventional cryptosy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…This will provide information needed by civil society in improving their level of knowledge about legal action that can be applied to criminals who damage the environment as well as additional knowledge about environmental issues. Planning approach in the form top to bottom must be reduced and replaced with the planning approach from the bottom up (Kaabneh and Al-Bdour, 2005). This approach takes into account the hopes and aspirations of civil society in efforts to minimize environmental problems.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…This will provide information needed by civil society in improving their level of knowledge about legal action that can be applied to criminals who damage the environment as well as additional knowledge about environmental issues. Planning approach in the form top to bottom must be reduced and replaced with the planning approach from the bottom up (Kaabneh and Al-Bdour, 2005). This approach takes into account the hopes and aspirations of civil society in efforts to minimize environmental problems.…”
Section: Resultsmentioning
confidence: 99%
“…The researcher expects that adequate education about the environment is given. Various studies have been carried out by (Md Taff, 2007;Mittelstaedt et al, 1999;Palmberg and Kuru, 2000;Kaabneh and Al-Bdour et al, 2005) in the field of outdoor education, proving that it is one of the effective medium in shaping the attitudes and understanding of environmental positively to the students since the early stages because the education that allows them more aware of environmental issues in addition to reducing the environmental problems that increasingly threaten the health masyarakat. In addition, the government must do everything in our human capital development strategies and economic to increase the household population.…”
Section: Resultsmentioning
confidence: 99%
“…Some of these PKC are the Diffie-Hellman keys exchange algorithm (Kaabneh and Al-Bdour, 2005), the decipherment operation in the RSA algorithm (Quisquater and Couvreur, 1982), the US Government Digital Signature Standard (Kammer and Daley, 2000) and also elliptic curve cryptography (Koblitz, 1987).…”
Section: Introductionmentioning
confidence: 99%
“…This time span may be used to securely transmit an alarm message to the network management center. The second approach proposed by Schartner & Rass (2010) resurrects the idea of keeping public parameters secret, like proposed by Kaabneh & Al-Bdour (2005). Here the idea is to use the remaining key material in the most efficient way and maintain a high level of secrecy during the DOS attack on the QKD link(s).…”
Section: Trusted Nodes Denial-of-service Maintenance and Recoverymentioning
confidence: 99%