Next generation security for wireless: elliptic curve cryptography

Scott Vanstone, from Certicom, polemicizes for elliptic curve cryptography. He advances his company's view that ECC is the next generation of public-key cryptography for wireless.

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2003-01, Vol.22 (5), p.412-415
1. Verfasser: Vanstone, S.A
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 415
container_issue 5
container_start_page 412
container_title Computers & security
container_volume 22
creator Vanstone, S.A
description Scott Vanstone, from Certicom, polemicizes for elliptic curve cryptography. He advances his company's view that ECC is the next generation of public-key cryptography for wireless.
doi_str_mv 10.1016/S0167-4048(03)00507-8
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_207375304</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404803005078</els_id><sourcerecordid>374634161</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-b9a6a61ccffdc26e9a3e7330ac9220c2501fbd9113d1c7603dc06327527a82a3</originalsourceid><addsrcrecordid>eNqFkM1OwzAQhC0EEqXwCEgRJzgE1nZiO1wQVPxJFRzo3XKdTXEVkmC7hbw9aYu4ctk97Mys5iPklMIlBSqu3oYh0wwydQ78AiAHmao9MqJKslQwUPtk9Cc5JEchLAGoFEqNyN0LfsdkgQ16E13bJAHtyrvYJ1Xrky_nscYQrhOsa9dFZ5PhusbE-r6L7cKb7r0_JgeVqQOe_O4xmT3czyZP6fT18XlyO00t51lM54URRlBrq6q0TGBhOErOwdiCMbAsB1rNy4JSXlIrBfDSguBM5kwaxQwfk7NdbOfbzxWGqJftyjfDR81AcplzyAZRvhNZ34bgsdKddx_G95qC3sDSW1h6Q0ID11tYWg2-m50PhwJrh14H67CxWA4EbNRl6_5J-AFPxnFU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>207375304</pqid></control><display><type>article</type><title>Next generation security for wireless: elliptic curve cryptography</title><source>Access via ScienceDirect (Elsevier)</source><creator>Vanstone, S.A</creator><creatorcontrib>Vanstone, S.A</creatorcontrib><description>Scott Vanstone, from Certicom, polemicizes for elliptic curve cryptography. He advances his company's view that ECC is the next generation of public-key cryptography for wireless.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/S0167-4048(03)00507-8</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Cryptography ; Cybersecurity ; Public Key Infrastructure ; Technological change</subject><ispartof>Computers &amp; security, 2003-01, Vol.22 (5), p.412-415</ispartof><rights>2003 Elsevier Science Ltd</rights><rights>Copyright Elsevier Sequoia S.A. 2003</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c334t-b9a6a61ccffdc26e9a3e7330ac9220c2501fbd9113d1c7603dc06327527a82a3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/S0167-4048(03)00507-8$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Vanstone, S.A</creatorcontrib><title>Next generation security for wireless: elliptic curve cryptography</title><title>Computers &amp; security</title><description>Scott Vanstone, from Certicom, polemicizes for elliptic curve cryptography. He advances his company's view that ECC is the next generation of public-key cryptography for wireless.</description><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Public Key Infrastructure</subject><subject>Technological change</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2003</creationdate><recordtype>article</recordtype><recordid>eNqFkM1OwzAQhC0EEqXwCEgRJzgE1nZiO1wQVPxJFRzo3XKdTXEVkmC7hbw9aYu4ctk97Mys5iPklMIlBSqu3oYh0wwydQ78AiAHmao9MqJKslQwUPtk9Cc5JEchLAGoFEqNyN0LfsdkgQ16E13bJAHtyrvYJ1Xrky_nscYQrhOsa9dFZ5PhusbE-r6L7cKb7r0_JgeVqQOe_O4xmT3czyZP6fT18XlyO00t51lM54URRlBrq6q0TGBhOErOwdiCMbAsB1rNy4JSXlIrBfDSguBM5kwaxQwfk7NdbOfbzxWGqJftyjfDR81AcplzyAZRvhNZ34bgsdKddx_G95qC3sDSW1h6Q0ID11tYWg2-m50PhwJrh14H67CxWA4EbNRl6_5J-AFPxnFU</recordid><startdate>20030101</startdate><enddate>20030101</enddate><creator>Vanstone, S.A</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20030101</creationdate><title>Next generation security for wireless: elliptic curve cryptography</title><author>Vanstone, S.A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-b9a6a61ccffdc26e9a3e7330ac9220c2501fbd9113d1c7603dc06327527a82a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Public Key Infrastructure</topic><topic>Technological change</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Vanstone, S.A</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vanstone, S.A</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Next generation security for wireless: elliptic curve cryptography</atitle><jtitle>Computers &amp; security</jtitle><date>2003-01-01</date><risdate>2003</risdate><volume>22</volume><issue>5</issue><spage>412</spage><epage>415</epage><pages>412-415</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>Scott Vanstone, from Certicom, polemicizes for elliptic curve cryptography. He advances his company's view that ECC is the next generation of public-key cryptography for wireless.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/S0167-4048(03)00507-8</doi><tpages>4</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2003-01, Vol.22 (5), p.412-415
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_journals_207375304
source Access via ScienceDirect (Elsevier)
subjects Cryptography
Cybersecurity
Public Key Infrastructure
Technological change
title Next generation security for wireless: elliptic curve cryptography
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T12%3A56%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Next%20generation%20security%20for%20wireless:%20elliptic%20curve%20cryptography&rft.jtitle=Computers%20&%20security&rft.au=Vanstone,%20S.A&rft.date=2003-01-01&rft.volume=22&rft.issue=5&rft.spage=412&rft.epage=415&rft.pages=412-415&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/S0167-4048(03)00507-8&rft_dat=%3Cproquest_cross%3E374634161%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=207375304&rft_id=info:pmid/&rft_els_id=S0167404803005078&rfr_iscdi=true