Implementation of Blom's key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.]
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom's Key pre-distribution uses an integer finite field which makes this scheme easy to be inte...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Book |
Published: |
Penerbit UiTM,
2021-10.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Internet
Link Metadata3rd Floor Main Library
Call Number: |
A1234.567 |
---|---|
Copy 1 | Available |