Author of the publication

A secure approach for embedding message text on an elliptic curve defined over prime fields, and building 'EC-RSA-ELGamal' Cryptographic System.

, , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RSA algorithm with a new approach encryption and decryption message text by ascii., , and . CoRR, (2016)A secure approach for embedding message text on an elliptic curve defined over prime fields, and building 'EC-RSA-ELGamal' Cryptographic System., , and . CoRR, (2017)Security Challenges Review in Agile and DevOps Practices., , , , , , and . ICIT, page 102-107. IEEE, (2023)A New System for Road Traffic Optimisation Using the Virtual Traffic Light Technology., , and . Comput. Syst. Sci. Eng., 47 (1): 637-656 (2023)Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem., , , , , and . ICIT, page 218-223. IEEE, (2021)Improving accuracy of wireless sensor networks localisation based on communication ranging., , and . IET Commun., 14 (18): 3184-3193 (2020)Load Balancing Techniques in Software-Defined Cloud Computing: an overview., , and . SDS, page 240-244. IEEE, (2020)A Review on Forest Fire Detection Techniques.. IJDSN, (2014)A novel method for localising a randomly distributed wireless sensor network., , , and . Int. J. Syst. Assur. Eng. Manag., 9 (2): 354-361 (2018)ROAD TRAFFIC Management SOLUTIONS., , and . ICIT, page 558-564. IEEE, (2021)