Found about 2 results
Downloads: 144 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Mathematics, India, Volume 4 Issue 2, February 2015
605 - 608An Identity-Based Secure Authenticated Framework by Using ECC in Cloud Computing
Nasheem Khan | Vinod Kumar [39] | Adesh Kumari [2]
Share this Article
Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Mathematics, India, Volume 3 Issue 6, June 2014
587 - 589Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography
Vinod Kumar [39] | Adesh Kumari [2]
Share this Article