Citations in impact factor journals
Secure Communication of Medical Information Using Mobile Agents Journal of Medical Systems |
Citation to this article as recorded by
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690. CrossRefDirect Link |
Rezai, A. and P. Keshavarzi, 2012. A New cmm-naf modular exponentiation algorithm by using a new modular multiplication algorithm. Trends Applied Sci Res., 7: 240-247. CrossRefDirect Link |
Citation to this article as recorded by
An anonymous and secure key agreement protocol for NFC applications using pseudonym Wireless Networks |
Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment EURASIP Journal on Information Security Vol. 2020, Issue 1, , 2020 |
An Improved Digital Signature Protocol to Multi-User Broadcast
Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks
(WSNs) Mathematical and Computational Applications Vol. 23, Issue 2, 17, 2018 |
Encryption Algorithm of RSH (Round Sheep Hash) Information Technology Journal Vol. 10, Issue 3, 686, 2011 |
A New CMM-NAF Modular Exponentiation Algorithm by using a New Modular Multiplication Algorithm Trends in Applied Sciences Research Vol. 7, Issue 3, 240, 2012 |
How to cite this article
Morteza Nikooghadam, Mohammad Reza Bonyadi, Ehsan Malekian and Ali Zakerolhosseini, 2008. A Protocol for Digital Signature Based on the Elliptic Curve Discrete Logarithm Problem. Journal of Applied Sciences, 8: 1919-1925.
DOI: 10.3923/jas.2008.1919.1925
URL: https://scialert.net/abstract/?doi=jas.2008.1919.1925
DOI: 10.3923/jas.2008.1919.1925
URL: https://scialert.net/abstract/?doi=jas.2008.1919.1925