{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:42Z","timestamp":1750307142412,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T00:00:00Z","timestamp":1317340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,30]]},"DOI":"10.1145\/2047456.2047457","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Elliptic curve for data protection"],"prefix":"10.1145","author":[{"given":"Wasim A.","family":"Al-Hamdani","sequence":"first","affiliation":[{"name":"Kentucky State University, East Main, KY"}]}],"member":"320","published-online":{"date-parts":[[2011,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Entrust.com 2008. Elliptic Curve PKI: An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography.  Entrust.com 2008. Elliptic Curve PKI: An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography."},{"volume-title":"Quantum Cryptography: Privacy Through Uncertainty. Retrieved from CSA information company: http:\/\/www.csa.com","year":"2002","author":"Vittorio S.","key":"e_1_3_2_1_2_1"},{"volume-title":"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, (pp. 175--179)","year":"1984","author":"Bennett C. H.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1092-50"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Goldreich O. 2001. Foundations of Cryptography: Volume 1 Basic Tools. Cambridge University Press.   Goldreich O. 2001. Foundations of Cryptography: Volume 1 Basic Tools. Cambridge University Press.","DOI":"10.1017\/CBO9780511546891"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Katz J. & Lindell Y. 2007. Introduction to Modern Cryptography. Chapman and Hall\/CRC Press.   Katz J. & Lindell Y. 2007. Introduction to Modern Cryptography. Chapman and Hall\/CRC Press.","DOI":"10.1201\/9781420010756"},{"key":"e_1_3_2_1_7_1","unstructured":"Al-Hamdani W. A. 1999\"Cipher Systems \"Iraqi National Library No. 135 in 29-05-1997  Al-Hamdani W. A. 1999\"Cipher Systems \"Iraqi National Library No. 135 in 29-05-1997"},{"key":"e_1_3_2_1_8_1","unstructured":"Menezes A. J. 1996. Handbook of Applied Cryptography. CRC Press.   Menezes A. J. 1996. Handbook of Applied Cryptography. CRC Press."},{"key":"e_1_3_2_1_9_1","unstructured":"RSALab. 1992. Cryptography FAQ Chapter 2 and Chapter 2. Retrieved from Rsa Lab: http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2213  RSALab. 1992. Cryptography FAQ Chapter 2 and Chapter 2. Retrieved from Rsa Lab: http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2213"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_2_1_11_1","unstructured":"Miller V. 1985. Use of elliptic curves in cryptography. CRYPTO 85.   Miller V. 1985. Use of elliptic curves in cryptography. CRYPTO 85."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the First International Symposium on Algorithmic Number Theory. Springer Lecture Notes In Computer Science;","volume":"877","author":"Lay G.-J.","year":"1998"},{"key":"e_1_3_2_1_13_1","unstructured":"Rosing M. 1999. Implementation Elliptic Curve Cryptography. Manning Pub.   Rosing M. 1999. Implementation Elliptic Curve Cryptography. Manning Pub."},{"key":"e_1_3_2_1_14_1","unstructured":"Blake I. F. 2005. Advances in Elliptic Curve Cryptography. Cambridge University Press Series: London Mathematical Society Lecture Note Series (No. 317).   Blake I. F. 2005. Advances in Elliptic Curve Cryptography. Cambridge University Press Series: London Mathematical Society Lecture Note Series (No. 317)."},{"key":"e_1_3_2_1_15_1","unstructured":"nsa.gov. 2009. The Case for Elliptic Curve Cryptography. Retrieved from The National Security Agency Central Security Service: can be retrieved from http:\/\/www.nsa.gov\/business\/programs\/elliptic_curve.shtml  nsa.gov. 2009. The Case for Elliptic Curve Cryptography. Retrieved from The National Security Agency Central Security Service: can be retrieved from http:\/\/www.nsa.gov\/business\/programs\/elliptic_curve.shtml"},{"key":"e_1_3_2_1_16_1","unstructured":"nsa.gov. (n.d.). NSA Suite B Cryptography. Retrieved from The National Security Agency Central Security Service: can be retrieved from http:\/\/www.nsa.gov\/ia\/programs\/suiteb_cryptography\/index.shtml  nsa.gov. (n.d.). NSA Suite B Cryptography. Retrieved from The National Security Agency Central Security Service: can be retrieved from http:\/\/www.nsa.gov\/ia\/programs\/suiteb_cryptography\/index.shtml"},{"key":"e_1_3_2_1_17_1","unstructured":"Givens B. (2009). Privacy Today: A Review of Current Issues. Retrieved from Privacy Rights Clearinghouse (PRC): http:\/\/www.privacyrights.org\/  Givens B. (2009). Privacy Today: A Review of Current Issues. Retrieved from Privacy Rights Clearinghouse (PRC): http:\/\/www.privacyrights.org\/"},{"volume-title":"R. K. (ed), ICSA Guide to Cryptography (p. chapter 22 in)","author":"Soutar C.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"Zhu L. Jaganathan K. & Lauter K. (2008). RFC5349 - Elliptic Curve Cryptography (ECC) Support for Public. faqs.org.  Zhu L. Jaganathan K. & Lauter K. (2008). RFC5349 - Elliptic Curve Cryptography (ECC) Support for Public. faqs.org."},{"key":"e_1_3_2_1_20_1","unstructured":"Beth G. (retrived 20009). privacyrights.org. Retrieved from Privacy Today: A Review of Current Issues: http:\/\/www.privacyrights.org\/ar\/Privacy-IssuesList.htm#u  Beth G. (retrived 20009). privacyrights.org. Retrieved from Privacy Today: A Review of Current Issues: http:\/\/www.privacyrights.org\/ar\/Privacy-IssuesList.htm#u"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Blake-Wilson S. Bolyard N. Gupta V. Hawk C. & Moeller B. 2006. RFC4492 - Elliptic Curve Cryptography (ECC) Cipher Suites for T. faqs.org.  Blake-Wilson S. Bolyard N. Gupta V. Hawk C. & Moeller B. 2006. RFC4492 - Elliptic Curve Cryptography (ECC) Cipher Suites for T. faqs.org.","DOI":"10.17487\/rfc4492"},{"key":"e_1_3_2_1_22_1","unstructured":"entrust.com. 2008. Elliptic Curve PKI: An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography. Retrieved from www.entrust.com: www.entrust.com  entrust.com. 2008. Elliptic Curve PKI: An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography. Retrieved from www.entrust.com: www.entrust.com"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1940941.1940960"},{"key":"e_1_3_2_1_24_1","unstructured":"Leu M.-C. & Sun H.-M. (2009). Authentication method employing elliptic curve cryptography. Retrieved from faqs.org: http:\/\/www.faqs.org\/patents\/  Leu M.-C. & Sun H.-M. (2009). Authentication method employing elliptic curve cryptography. Retrieved from faqs.org: http:\/\/www.faqs.org\/patents\/"},{"key":"e_1_3_2_1_25_1","unstructured":"FIPS PUB 186-2 2000. Digital Signature Standard (DSS) U. S. DEPARTMENT OF COMMERCE\/National Institute of Standards and Technology  FIPS PUB 186-2 2000. Digital Signature Standard (DSS) U. S. DEPARTMENT OF COMMERCE\/National Institute of Standards and Technology"}],"event":{"name":"InfoSecCD '11: Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '11"},"container-title":["Proceedings of the 2011 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047456.2047457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:54Z","timestamp":1750240134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047457"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,30]]},"references-count":25,"alternative-id":["10.1145\/2047456.2047457","10.1145\/2047456"],"URL":"https:\/\/doi.org\/10.1145\/2047456.2047457","relation":{},"subject":[],"published":{"date-parts":[[2011,9,30]]},"assertion":[{"value":"2011-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}