2013
DOI: 10.5539/nct.v2n2p43
|View full text |Cite
|
Sign up to set email alerts
|

Network Security in Cloud Computing with Elliptic Curve Cryptography

Abstract: This paper researches on cloud computing based-on authentication for the security verification using Elliptic Curve Digital Signature Algorithm (ECDSA). The study structure simply focuses on the communication interaction of the Cloud providing communities and a pictured Smartphone user. The Elliptic Curve Cryptosystem is envisioned as the basic framework for data transmission security in the paper that proffers solution. We reviewed various literatures on the elliptic curves and applied the cyclic elliptic cur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Approach in [19] proposed an efficient protocol by analysing two variants of ECC-based wireless authentication protocol, namely, Aydos-Savas-Koc's wireless authentication protocol (ASK-WAP) and user authentication protocol (UAP) from various security aspects and communication concerns. Work given in [20] explained a reconfigurable hardware based on prime fields. Bit length up to 256 is considered.…”
Section: Related Workmentioning
confidence: 99%
“…Approach in [19] proposed an efficient protocol by analysing two variants of ECC-based wireless authentication protocol, namely, Aydos-Savas-Koc's wireless authentication protocol (ASK-WAP) and user authentication protocol (UAP) from various security aspects and communication concerns. Work given in [20] explained a reconfigurable hardware based on prime fields. Bit length up to 256 is considered.…”
Section: Related Workmentioning
confidence: 99%