slugStudy of Signcryption and ECC scheme
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
the explosive growth is the use of mobile devices demands a new generation of PKC scheme that includes limitations of power and bandwidth at the same time to provide sufficient level of security for such devices, the functionality of encryption and digital signature in a single process is known as signcryption to achieve security. It decreases the computational costs and communication overheads in comparison with the established signature then encryption schemes. ECC is another technique of PKC which used to reduce the computational cost of your daily life used devices which consumes, more power, like laptops, tabs, PDA ect, it also reduce the key size, this paper examines the use of ECC and signcryption in such constrained environment and discusses the basics of ECC and signcryption security, and lastly it explore the performance, survey and use of signcryption techniques.
Authors and Affiliations
Reenu saini, Mamta tewari
Congestion-Aware Bandwidth Assignment In Wireless Mesh Networks
Engineering the network capacity requires a complex cross-layer design in multi-radio multi-channel wireless mesh networks. A decoupling approach that breaks down the entire design space into routing and initial channel...
Methods for Character Identification in Movies: A Review
Now a day’s character Identification from films is a very challenging task due to the huge variation in the appearance of each & every character. It will lead significant research interests and may have many interesting...
Design and Development of Automatic Wire Cutting Machine: A Case Study in Small Scale Industry
This Paper gives the detailed information about the design and development of automatic wire cutting machine. At present conventional method is used for wire cutting and measuring which takes more time which requires ma...
Comparison between Neural Network and Fuzzy Logic on Assessment of Long Term Concrete Compressive Strength and Expansion Due To Sulfate Attack
This study is divided into two phases. Phase I includes assessment of the validation of neural network and fuzzy logic in predicting mortar and concrete properties due to sulfate attack. These properties include expansi...
slugSurvey on Video Based Fire Detection Systems
Detecting break out of fire rapidly is vital for prevention of material damage and human casualties. Traditional point sensors detect heat or smoke particles and are quite successful for indoor fire detection. They will...