ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: ECC
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Privacy-Preserving Data Mining in Homogeneous
Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt
#
1
# Active authentication
# data originator
# verifier
# E CC
# e&passport
# ES
# passive authentication
Curve Cryptography and its Variants
#
An Integrated Radix-4 Modular Divider/Multiplier
1
#Cryptography
# number theory
# finite field arithmetic
# hardware de sign
# and radix$4
#ECC
# time stamp
# nonce value
# mathematical model
Arumugam Sakthivel
#Active broadcast encryption
# cloud
# data distribution
# group signature
Fingerprint Verification Methods Using
Instituto Politécnico Nacional, Sección de Estudios de Posgrado e Investigación, Unidad Culhuacán,
#Angle of orientation
# delaunay triangulation
# EER
# fingerprint
# geometric thresholds
Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve
University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan
#IoT
# CoAP
# ECC
#energy saving
# security
# IoT
An Integrated Radix-4 Modular Divider/Multiplier
1
#Cryptography
# number theory
# finite field arithmetic
# hardware de sign
# and radix$4
Least Recently Plus Five Least Frequently Replacement Policy (LR+5LF)
Computer Science Department, The Arab American Univ ersity of Jenin, Palestine 2Computer Engineering Department, The Islamic University of Gaza, Palestine
#Cache memory
# replacement policy
# LRU
# LFU
# miss ra te
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint