An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level...
Saved in:
Main Authors: | Vinothkumar Muthurajan, Balaji Narayanasamy |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2016-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2016/4913015 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
by: Zhenlong Man, et al.
Published: (2025-02-01) -
Robust Schnorr-based subgroup multi-signature scheme
by: ZHANG Zhenqi, et al.
Published: (2024-08-01) -
A Forward-Secure Digital Signature Based on Elliptic Curve
by: Huiyan Chen, et al.
Published: (2015-10-01) -
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01) -
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
by: Jie ZHAO, et al.
Published: (2016-06-01)