@incollection{, A8833CA3C6471E3C537731BB20FCACEA , author={{KoffkaKhan} and {The University of the West Indies, Trinidad and Tobago, W.I}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1552535 } @incollection{b0, , title={{Toward a theory of Pollard's rho method}} , author={{ EBach }} , journal={{Information and Computation}} 90 2 , year={1991} } @incollection{b1, , title={{Software infrastructure and design challenges for ubiquitous computing applications}} , author={{ GBanavar } and { ABernstein }} , journal={{Communications of the ACM}} 45 12 , year={2002} } @book{b2, , title={{Some integer factorization algorithms using elliptic curves}} , author={{ RPBrent }} arXiv:1004.3366 , year={2010} , note={arXiv preprint} } @book{b3, , title={{}} , author={{ VMDavis } and { SCCutino } and { MJBerg } and { FSConklin } and { SJPringle }} , year={2001} 282 , address={Washington, DC: U.S} , note={U.S. Patent} , note={Patent and Trademark Office} } @book{b4, , title={{Internet besieged: Countering cyberspace scofflaws}} , author={{ DE RDenning } and { PJDenning }} , year={1998} , publisher={ACM Press} } @incollection{b5, , title={{A public key cryptosystem and a signature scheme based on discrete logarithms}} , author={{ TElgamal }} , booktitle={{Advances in Cryptology}} Berlin Heidelberg , publisher={Springer} , year={1985. January} } @book{b6, , title={{}} , author={{ RFerri } and { MKim } and { EYee }} , year={2004} , address={U.S} , note={Patent Application 10/856,684} } @book{b7, , title={{RFID handbook: radiofrequency identification fundamentals and applications}} , author={{ KFinkenzeller }} , year={1999} , publisher={Wiley} , address={New York} } @incollection{b8, , title={{Discrete logarithm problem}} , author={{ DGordon }} , booktitle={{Encyclopedia of Cryptography and Security}} , publisher={Springer US} , year={2011} } @incollection{b9, , title={{The elliptic curve digital signature algorithm (ECDSA)}} , author={{ DJohnson } and { AMenezes } and { SVanstone }} , journal={{International Journal of Information Security}} 1 1 , year={2001} } @incollection{b10, , title={{Remarks on elliptic curve discrete logarithm problems}} , author={{ NKanayama } and { TKobayashi } and { TSaito } and { SUchiyama }} , journal={{IEICE Transactions on Fundamentals of Electronics}} 83 1 , year={2000} , note={Communications and Computer Sciences} } @book{b11, , title={{Elliptic curve cryptosystems. Mathematics of computation}} , author={{ NKoblitz }} , year={1987} 48 } @book{b12, , title={{RFID sourcebook}} , author={{ SLahiri }} , year={2005} , publisher={IBM press} } @incollection{b13, , title={{Public key cryptography and RFID tags}} , author={{ MMcloone } and { MJRobshaw }} , booktitle={{Topics in Cryptology-CT-RSA 2007}} Berlin Heidelberg , publisher={Springer} , year={2006} } @incollection{b14, , title={{Towards a distributed platform for resource-constrained devices}} , author={{ AMesser } and { IGreenberg } and { PBernadat } and { DMilojicic } and { DChen } and { TJGiuli } and { XGu }} , booktitle={{Distributed Computing Systems}} , year={2002. 2002} } @incollection{b15, , title={{Use of elliptic curves in cryptography}} , author={{ VSMiller }} , booktitle={{Advances in Cryptology-CRYPTO'85 Proceedings}} Berlin Heidelberg , publisher={Springer} , year={1986. January} } @incollection{b16, , title={{A survey of modern integer factorization algorithms}} , author={{ PLMontgomery }} , journal={{CWI quarterly}} 7 4 , year={1994} } @incollection{b17, , title={{Simultaneous security of bits in the discrete log}} , author={{ RPeralta }} , booktitle={{Advances in Cryptology-Eurocrypt'85}} Berlin Heidelberg , publisher={Springer} , year={1986. January} } @incollection{b18, , title={{Kangaroos, monopoly and discrete logarithms}} , author={{ JMPollard }} , journal={{Journal of cryptology}} 13 4 , year={2000} } @book{b19, , title={{Smart card handbook}} , author={{ WRankl } and { WEffing }} , year={2010} , publisher={John Wiley & Sons} } @incollection{b20, , title={{A new polynomial factorization algorithm and its implementation}} , author={{ VShoup }} , journal={{Journal of Symbolic Computation}} 20 4 , year={1995} } @incollection{b21, , title={{Elliptic curve discrete logarithms and the index calculus}} , author={{ JHSilverman } and { JSuzuki }} , booktitle={{Advances in Cryptology-ASIACRYPT'98}} Berlin Heidelberg , publisher={Springer} , year={1998. January} } @incollection{b22, , title={{The exact security of ECIES in the generic group model}} , author={{ NPSmart }} , booktitle={{Cryptography and Coding}} Berlin Heidelberg , publisher={Springer} , year={2001} } @incollection{b23, , title={{hard real-time systems}} , author={{ WZhao } and { KRamamritham } and { JAStankovic }} , journal={{Software Engineering}} 5 , year={1987} , note={IEEE Transactions on} }