Computational Intelligence in Security for Information Systems
Springer, Berlin, Heidelberg
Chapter title |
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields
|
---|---|
Chapter number | 20 |
Book title |
Computational Intelligence in Security for Information Systems
|
Published by |
Springer, Berlin, Heidelberg, January 2011
|
DOI | 10.1007/978-3-642-21323-6_20 |
Book ISBNs |
978-3-64-221322-9, 978-3-64-221323-6
|
Authors |
V. Gayoso Martínez, L. Hernández Encinas, C. Sánchez Ávila |
Country | Count | As % |
---|---|---|
Unknown | 13 | 100% |
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 4 | 31% |
Other | 2 | 15% |
Professor > Associate Professor | 2 | 15% |
Student > Bachelor | 2 | 15% |
Student > Doctoral Student | 1 | 8% |
Other | 1 | 8% |
Unknown | 1 | 8% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 10 | 77% |
Engineering | 2 | 15% |
Unknown | 1 | 8% |