[1] | Ryan Ausanka-Crues, "Methods for access control: Advances and limitations," Harvey Mudd College, vol. 301, 2001. |
[2] | Jason Crampton, "Cryptographic enforcement of role-based access control," in Formal. |
[3] | Anthony Harrington and Christian Jensen, "Cryptographic access control in a distributed file system," in Proceedings of the Eighth. |
[4] | Urs Hengartner and Peter Steenkiste, "Exploiting hierarchical identity-based encryption for access control to pervasive computing information," DTIC Document, Tech. rep. 2004. |
[5] | Anne V. D. M. Kayem and et al, "Enhancing identity trust in cryptographic key management systems for dynamic environments," Security and Communication Networks, vol. 4, no. 1, pp. 79-94, 2011. |
[6] | Anne VDM Kayem and et al., "A presentation of access control methods," in Adaptive. |
[7] | L. Xiaoqin and et al, "Application of the Advanced Encryption Standard and DM642 in the image transmission system," in Computer Science Education (ICCSE), 2012 7th International Conference on, July 2012, pp. 444-447. |
[8] | Bing Ji and et al, "New Version of AES-ECC Encryption System Based on FPGA in WSNs," Journal of Software Engineering, vol. 9, no. 1, pp. 87-95, 2015. |
[9] | Jignesh R. Patel and Rajesh S. Bansode, "Hybrid Security Algorithms for Data Transmission using AES-DES," International Journal of Applied Information Systems (IJAIS), vol. 2, no. 2, pp. 15-21, 2012. |
[10] | Xiyao Liu and et al, "A Secure Medical Information Management System for Wireless Body Area Networks," KSII Transactions on Internet \& Information Systems, vol. 10, no. 1, 2016. |
[11] | Challa Vamshi Krishna and et al, "Design Implementation of Composite Field S-Box using AES 256 Algorithm," International Journal of Emerging Engineering Research and Technology (IJEERT), vol. 3, no. 12, pp. 43-51, 2016. |
[12] | Vishal R. Pancholi and Bhadresh P. Patel, "Enhancement of Cloud Computing Security with Secure Data Storage using AES," International Journal for Innovative Research in Science and Technology, vol. 2, no. 9, pp. 18-21, 2016. |
[13] | Kundankumar Rameshwar Saraf and et al, "Text and image encryption decryption using advanced encryption standard," IJETTCS, vol. 3, no. 3, pp. 118-26, 2014. |
[14] | Nils Gura and et al, Marc Joye and Jean-Jacques Quisquater, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, ch. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, pp. 119-132. |
[15] | Rajesh P. Singh and et al, "Public Key Cryptography Using Permutation P-Polynomials over Finite Fields.," IACR Cryptology ePrint Archive, vol. 2009, p. 208, 2009. |
[16] | Haodong Wang and et al, "Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control," in Distributed. |
[17] | Davide Schipani and et al, "Efficient evaluation of polynomials over finite fields," arXiv preprint arXiv: 1102.4771, 2011. |
[18] | Payman Mohassel, "Fast computation on encrypted polynomials and applications," in Cryptology and |
[19] | Edgar R. Weippl and et al, "Content-based Management of Document Access Control," in |
[20] | Yu Fang Chung and et al, "Access control in user hierarchy based on elliptic curve cryptosystem," Information Sciences, vol. 178, no. 1, pp. 230-243, 2008. |
[21] | Nils Gura and et al, "An end-to-end systems approach to elliptic curve cryptography," in Cryptographic. |
[22] | Xuan Hung Le and et al, "An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography," Communications and Networks, Journal of, vol. 11, no. 6, pp. 599-606, 2009. |
[23] | Santanu Chatterjee and Ashok Kumar Das, "An effective ECC based user access control scheme with attribute based encryption for wireless sensor networks," Security and Communication Networks, vol. 8, no. 9, pp. 1752-1771, 2015. |
[24] | Nigel P. Smart, "Elliptic Curves," in Cryptography Made Simple.: Springer, 2016, pp. 67-78. |
[25] | Steven D. Galbraith and Pierrick Gaudry, "Recent progress on the elliptic curve discrete logarithm problem," Designs, Codes and Cryptography, vol. 78, no. 1, pp. 51-72, 2016. |
[26] | Ali Soleymani and et al, "A Novel Public Key Image Encryption Based on Elliptic Curves over Prime Group Field," Journal of Image and Graphics, vol. 1, no. 1, 2013. |
[27] | Charles Edge and Daniel O' Donnell, "Introduction to Cryptography," in Enterprise Mac Security.: Springer, 2016, pp. 497-499. |
[28] | Daniel J. Bernstein and et al, "High-speed high-security signatures," Journal of Cryptographic Engineering, vol. 2, no. 2, pp. 77-89, 2012. |
[29] | Tibor Jager and et al, "Practical invalid curve attacks on TLS-ECDH," Computer Security--ESORICS 2015, pp. 407-425, 2015. |
[30] | C. A. O. Yang and et al, "One ECDH key agreement scheme with authentication based on ECDLP," Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), vol. 1, no. 24, 2012. |
[31] | Marc Joye, "Secure ElGamal-Type Cryptosystems Without Message Encoding," in The New Codebreakers.: Springer, 2016, pp. 470-478. |
[32] | Ziad E. Dawahdeh and et al, "Modified ElGamal Elliptic Curve Cryptosystem using Hexadecimal Representation," Indian Journal of Science and Technology, vol. 8, no. 15, July 2015. |
[33] | Eun-Hee Goo and Seung-Dae Lee, "Reconfigurable real number field elliptic curve cryptography to improve the security," Journal of Computer Virology and Hacking Techniques, vol. 11, no. 3, pp. 123-128, August 2015. |
[34] | D. Boruah and M. Saikia, "Implementation of ElGamal Elliptic Curve Cryptography over prime field using C," in Information Communication and Embedded Systems (ICICES), 2014 International Conference on, Feb 2014, pp. 1-7. |
[35] | Hermann Seuschek and et al, "A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes," in Proceedings of the Third Workshop on Cryptography and Security in Computing Systems. ACM, pp. 7-12, January 2016. |
[36] | Jeremy Dubeuf and et al, "ECDSA Passive Attacks, Leakage Sources, and Common Design Mistakes," ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 21, no. 2, p. 31, 2016. |
[37] | Don B. Johnson and Alfred J. Menezes, "Elliptic curve DSA (ECDSA): An enhanced DSA," Proceedings of the 7th conference on USENIX Security Symposium, vol. 7, 1998. |
[38] | Don Johnson and et al, "The elliptic curve digital signature algorithm (ECDSA)," International Journal of Information Security, vol. 1, no. 1, pp. 36-63, 2001. |
[39] | Akansha Singh and et al, "A Key Agreement Algorithm Based on ECDSA for Wireless Sensor Network," in Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pp. 143-149, 2016. |
[40] | Martinez GligorGayoso and et al, "A survey of the elliptic curve integrated encryption scheme," Journal of Computer Science and Engineering, vol. 2, no. 2, pp. 7-13, August 2010. |
[41] | Dominic Bucerzan and Crina Ra, "Image Processing with Android Steganography," in Soft Computing Applications.: Springer, 2016, pp. 27-36. |
[42] | Mike Godwin, "What Every Citizen Should Know About DRM," Public Knowledge New America Foundation, Washington, 2004. |
[43] | Renato Iannella, "Open digital rights management," in World. |
[44] | H. L. Jonker and et al, "Security aspects of DRM systems," in 25th.. |
[45] | Radia Perlman and et al, "Privacy-preserving DRM," in Proceedings of the 9th. |
[46] | Shruti Sarma Hazarika, "Digital Rights Management: A Restrictive Rather than a Defensive Mechanism and the Survival of the 'Fair Use' Doctrine," Available at SSRN 2180305, 2012. |
[47] | Chris McIntosh, "Cyber-security: Who will provide protection?," Computer Fraud & Security, vol. 2015, no. 12, pp. 19-20, 2015. |
[48] | Manuel Egele and et al, "An Empirical Study of Cryptographic Misuse in Android Applications," in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, New York, NY, USA, 2013, pp. 73-84. [Online]. http://doi.acm.org/10.1145/2508859.2516693. |
[49] | L. W. Paczkowski and et al, Trusted display and transmission of digital ticket documentation, #aug#~25 2015, |
[50] | M. Struik, Cryptographic method and apparatus, #may#~26 2015, |
[51] | Emilia K, "Fast elliptic curve cryptography in OpenSSL," in Financial Cryptography and Data Security.: Springer, 2011, pp. 27-39. |
[52] | Daniel J. Bernstein and Tanja Lange, "SafeCurves: Choosing safe curves for elliptic-curve cryptography," in ShmooCon 2014, 2014. [Online]. http://safecurves.cr.yp.to/ |