Secure Tranmission of Data by Elliptic Curve Cryptography

@inproceedings{Sibal2018SecureTO,
  title={Secure Tranmission of Data by Elliptic Curve Cryptography},
  author={Nirbhay Sibal and Tanvi Hasija and Shally Gupta},
  year={2018}
}
The most important factor of today’s businesses is data. Top organizations spend millions of dollars to save their networks and to protect their data. Imagine the situation when all the precious research data on which millions of dollars had been invested by the organization over the years. We are highly dependent today on computers for doing huge money transfers between banks, markets, insurance etc. We cannot take security in this critical area for granted. As the networks and systems… CONTINUE READING

Topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 12 REFERENCES

BaniYounes 1 and AmanJantan 2, “A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion,”IJCSNS

Mohammad Ali
  • International Journal of Computer Science and Network Security,
  • 2008
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

What Are the Advantages & Disadvantages of Elliptic Curve Cryptography for Wireless Security?

David Dunning
  • Conference Proceedings Volume
  • 2015

TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks

  • 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008)
  • 2008
VIEW 1 EXCERPT