{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:50Z","timestamp":1750307570287,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,2,26]],"date-time":"2010-02-26T00:00:00Z","timestamp":1267142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,2,26]]},"DOI":"10.1145\/1741906.1741997","type":"proceedings-article","created":{"date-parts":[[2010,3,30]],"date-time":"2010-03-30T12:32:28Z","timestamp":1269952348000},"page":"425-427","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A study of elliptic curve cryptography and its application"],"prefix":"10.1145","author":[{"given":"M.","family":"Prabu","sequence":"first","affiliation":[{"name":"Anna University Coimbatore, Tamil Nadu, India"}]},{"given":"R.","family":"Shanmugalakshmi","sequence":"additional","affiliation":[{"name":"Government College of Technology, Tamil Nadu, India"}]}],"member":"320","published-online":{"date-parts":[[2010,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2006.49"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIMA.2007.399"},{"key":"e_1_3_2_1_3_1","unstructured":"Eugen Petac \"About a method for Distribution keys of a computer netwrok using elliptic curves\"Department of mathematics and Computer Science 1997  Eugen Petac \"About a method for Distribution keys of a computer netwrok using elliptic curves\"Department of mathematics and Computer Science 1997"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2008.39"},{"key":"e_1_3_2_1_5_1","unstructured":"G. V. S. Raju and Rehan Akbani 2003 \"Elliptic Curve Cryptosystem and its Applications\" 2003 The University of Texas at san Atonio.  G. V. S. Raju and Rehan Akbani 2003 \"Elliptic Curve Cryptosystem and its Applications\" 2003 The University of Texas at san Atonio."},{"key":"e_1_3_2_1_6_1","unstructured":"Hans Eberle Nils Gura Scheduling Chang-Shantz \"A Cryptographic Processor for Arbitary Elliptic Curves Over GF(2m)\" 2003 proceedings of the Application-Specific System Architectures and processors(ASAP'03).  Hans Eberle Nils Gura Scheduling Chang-Shantz \"A Cryptographic Processor for Arbitary Elliptic Curves Over GF(2 m )\" 2003 proceedings of the Application-Specific System Architectures and processors(ASAP'03)."},{"key":"e_1_3_2_1_7_1","volume-title":"2005 IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communication","author":"Chao Wang","year":"2005","unstructured":"jia Xiangya, Wang Chao . \" The Application of Elliptic Curve Cryptosystem in Wireless Communication\" , 2005 IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communication , 2005 jia Xiangya, Wang Chao. \"The Application of Elliptic Curve Cryptosystem in Wireless Communication\", 2005 IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communication, 2005"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269719"},{"volume-title":"1998 Integrated System Laboratory","author":"Sutikno Sarwono","key":"e_1_3_2_1_9_1","unstructured":"Sarwono Sutikno , Andy Surya , Ronny Effendi , \" An Implementation of ElGamal Elliptic Curves Cryptosystems\" , 1998 Integrated System Laboratory , Bandung Institute of Technology . Sarwono Sutikno, Andy Surya, Ronny Effendi, \"An Implementation of ElGamal Elliptic Curves Cryptosystems\", 1998 Integrated System Laboratory, Bandung Institute of Technology."},{"key":"e_1_3_2_1_10_1","unstructured":"Qizhi Qiu and Qianxing Xiong 2003 \"Research On Elliptic Curve cryptography\"Wuhan University  Qizhi Qiu and Qianxing Xiong 2003 \"Research On Elliptic Curve cryptography\"Wuhan University"},{"key":"e_1_3_2_1_11_1","volume-title":"stallings, \"Cryptocgraphy and Network Security and, ourth edition","author":"W.","year":"2001","unstructured":"W. stallings, \"Cryptocgraphy and Network Security and, ourth edition , 2001 W. stallings, \"Cryptocgraphy and Network Security and, ourth edition, 2001"},{"key":"e_1_3_2_1_12_1","article-title":"Performance Analysis management in the session Initiation Protocol","author":"Rebahi Yacine","unstructured":"Yacine Rebahi , Jprdi Jaen Pallares , Gergely Kovacs , Dorgham Sisalem \" Performance Analysis management in the session Initiation Protocol \" IEEE Journal. Yacine Rebahi, Jprdi Jaen Pallares, Gergely Kovacs, Dorgham Sisalem \"Performance Analysis management in the session Initiation Protocol\"IEEE Journal.","journal-title":"IEEE Journal."}],"event":{"name":"ICWET '10: International Conference and Workshop on Emerging Trends in Technology","sponsor":["UNITECH Unitech Engineers, India","AICTE All India Council for Technical Education","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Mumbai Maharashtra India","acronym":"ICWET '10"},"container-title":["Proceedings of the International Conference and Workshop on Emerging Trends in Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1741906.1741997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:00Z","timestamp":1750250460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,26]]},"references-count":12,"alternative-id":["10.1145\/1741906.1741997","10.1145\/1741906"],"URL":"https:\/\/doi.org\/10.1145\/1741906.1741997","relation":{},"subject":[],"published":{"date-parts":[[2010,2,26]]},"assertion":[{"value":"2010-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}