slugStudy of Signcryption and ECC scheme
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
the explosive growth is the use of mobile devices demands a new generation of PKC scheme that includes limitations of power and bandwidth at the same time to provide sufficient level of security for such devices, the functionality of encryption and digital signature in a single process is known as signcryption to achieve security. It decreases the computational costs and communication overheads in comparison with the established signature then encryption schemes. ECC is another technique of PKC which used to reduce the computational cost of your daily life used devices which consumes, more power, like laptops, tabs, PDA ect, it also reduce the key size, this paper examines the use of ECC and signcryption in such constrained environment and discusses the basics of ECC and signcryption security, and lastly it explore the performance, survey and use of signcryption techniques.
Authors and Affiliations
Reenu saini, Mamta tewari
Parking Management Systems and Their Technologies - A Review
The number of personal vehicle usage is ever increasing; so is the number of people going to shop in malls. Finding a parking space in most shopping complexes, especially during the rush hours, is difficult for drivers....
Comparison of Digital Image Inpainting Techniques Based on SSIM
Digital Image Inpainting is a technique used to repair a damaged region of an image in such a way that it appears natural and continuous to an observer who is seeing it for the first time. Image inpainting is an importa...
slugScheduling Algorithms Implementation for LTE Downlink
The increasing demand for cellular communications leads to the development of Long Term Evolution (LTE). LTE is the evolution for existing 3G mobile networks which offers higher capacity, efficient utilization of radio...
A Review of Clustering Technique Based on Different Optimization Function Using for Selection of Center Point
The selection of center point is major issue in clustering technique. the center point of cluster decides the quality and validation of clustering technique. for the better selection of clustering technique used differe...
Fault Tolerant Protocol for UDS Flash Programming through Controller Area Network (CAN)
This paper proposes a fault tolerant protocol for CAN (Control Area Network) flash programming. Recently, the need of CAN flash programming is rapidly increasing because the number of installed ECU (Electronic Control...