CHENCHUAES
oracle Internet Directory 10.1.2 JUN 05
Efficient Java Implementation of Elliptic Curve Cryptography
Security Enabled Near Field Communication
Cryptologia Post
ENUS213-013.pdf
nShield Connect 6000
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Elliptic Curve Cryptography The EC Discrete Logarithm problem and Pollard’s Rho attack Ofer Schwarz, Winter 2012-2013 Advisor: Barukh Ziv.
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Networks
final yeAr projects Sbgc ( Chennai, Trichy, India, Tamilnadu)