Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
13
Page No.
3329 - 3333
References
Esfahani, M., M. Emami and H. Tajnesaei, 2013. The investigation of the relation between job involvement and organizational commitment. Manage. Sci. Lett., 3: 511-518.
CrossRef | Direct Link | Koblitz, N., 1987. Elliptic curve cryptosystems. Math. Comput., 48: 203-209.
Direct Link | Koblitz, N., A. Menezes and S. Vanstone, 2000. The state of elliptic curve cryptography. Des. Code Cryptogr., 19: 173-193.
Direct Link | Kolhekar, M. and A. Jadhav, 2011. Implementation of elliptic curve cryptography on text and image. Intl. J. Enterp. Comput. Bus. Syst., 1: 1-13.
Direct Link | Kumar, D., C.H. Suneetha and A. Chandrasekhar, 2012. Encryption 0f data using elliptic curve over finite field. Intl. J. Distrib. Parallel Syst., 3: 301-308.
Direct Link | Miller, V.S., 1986. Use of Elliptic Curves in Cryptography. In: Advances in Cryptology-CRYPTO'85, Williams, H.C. (Ed.)., Springer-Verlag, Berlin, Heidelberg, pp: 417-426.
Sagheer, A.M., 2012. Elliptic curves cryptographic techniques. Proceedings of the 6th International Conference on Signal Processing and Communication Systems (ICSPCS’12), December 12-14, 2012, IEEE, Gold Coast, Queensland, Australia, ISBN:978-1-4673-2392-5, pp: 1-7.
Tahmassebpour, M., 2017. A new method for time-series big data effective storage. IEEE Access, 2007: 10694-10699.
CrossRef | Direct Link | Teeriaho, J., 2011. Cyclic Group Cryptography with Elliptic Curves. Lapland University of Applied Sciences, Rovaniemi, Finland,.
Yan, S.Y., 2000. Number Theory for Computing. Springer, Berlin, Germany, ISBN:9783540654728, Pages: 381.