Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 noauthororeditor
%A Ray1, Sangram
%A and G. P. Biswas2,
%D 2013
%J International Journal on Cryptography and Information Security (IJCIS)
%K cryptography steganography
%N 1
%P 13
%T Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography
%U https://wireilla.com/papers/ijcis/V3N1/3113ijcis04.pdf
%V 3
@article{noauthororeditor,
added-at = {2022-08-11T11:00:28.000+0200},
author = {Ray1, Sangram and and G. P. Biswas2},
biburl = {https://www.bibsonomy.org/bibtex/2001af35bc3193372b7ba2f30c11bc166/alinta},
interhash = {edd5f6d176bef0d52b5c63d41b5ff0ce},
intrahash = {001af35bc3193372b7ba2f30c11bc166},
journal = {International Journal on Cryptography and Information Security (IJCIS)},
keywords = {cryptography steganography},
language = {English},
number = 1,
pages = 13,
timestamp = {2022-08-11T11:00:28.000+0200},
title = {Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography },
url = {https://wireilla.com/papers/ijcis/V3N1/3113ijcis04.pdf},
volume = 3,
year = 2013
}