@incollection{, 8EB647D9246A5F4CC792E9B7D4978C59 , author={{Dr. JayabhaskarMuthukuru} and {Prof. BachalaSathyanarayana} and {Sri Krishnadevaraya University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}121712 } @book{b0, , title={{Core Security Patterns: Best Practices and Strategies for J2EE?, Web Services, and Identity Management}} , author={{ ChristopherSteel } and { RameshNagappan } and { RayLai }} } @incollection{b1, , title={{Efficient and provably-secure identity-based signatures and signcryption from bilinear maps}} , booktitle={{Proc. Of ASIACRYPT'05}} Of ASIACRYPT'05 , year={2005} 3778 } @incollection{b2, , title={{Biometric and Systems Security: An Overview of End-To-End Security System}} , author={{ EmmanuelOpara } and { MohammadRob } and { VanceEtnyre }} , journal={{Communications of the IIMA}} 6 2 , year={2006} } @incollection{b3, , title={{Smart Card Technology: Past, Present, and Future}} , author={{ LMohammed } and { AbdulRahman Ramli } and { VPrakash } and { MohamedBDaud }} , journal={{International Journal of The Computer, the Internet and Management}} 12 1 , year={January -April, 2004} } @book{b4, , title={{Smart Card Alliance white paper}} PAC-11002 , year={March 2011} , note={Smart Cards and Biometrics} } @book{b5, , title={{Guide to Elliptic Curve Cryptography}} , author={{ DarrelHankerson } and { AlfredMenezes } and { ScottVanstone }} } @incollection{b6, , title={{EllipticCurve Cryptosystems}} , author={{ NKoblitz }} , booktitle={{Mathematics of Computation}} , year={1987} 48 } @incollection{b7, , title={{Uses of Elliptic Curve in Cryptography}} , author={{ VMiller }} , booktitle={{Proceedings of Crypto'85, Lectures notes on Computer Sciences}} Crypto'85, Lectures notes on Computer Sciences , publisher={Springer-Verlag} , year={1986} 218 , note={Advances in Cryptography} } @book{b8, , title={{A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment}} , author={{ VivekKatiyar } and { KamleshDutta } and { SyonaGupta }} , year={December 2010} , publisher={IJCA} 11 } @book{b9, , title={{Speeding up Secure Web Transactions using Elliptic Curve Cryptography (ECC)}} , author={{ VipulGupta } and { DouglasStebila } and { StephenFung } and { SheuelingChang } and { NilsGura } and { HansEberle }} } @book{b10, , author={{ AdamDWoodbury } and { DanielVBailey } and { ChristofPaar }} , title={{The Fourth Smart Card Research and Advanced Applications(CARDIS 2000) Conference}} , year={September 20-22, 2000} , note={ECC on smart cards without coprocessors} } @book{b11, , title={{Implimentating ECC on PC and smart card}} , author={{ IstvanZsolt } and { Berta } and { ZoltanAdam } and { Mann }} , year={2002} } @incollection{b12, , title={{Implementing an efficient elliptic curve cryptosystem over GF(p) on a smart card}} , author={{ YvonneHitchcock } and { EdwardDawson } and { AndrewClark } and { PaulMontague }} , journal={{ANZIAM J}} 44 , year={2003} } @incollection{b13, , title={{Elliptic Curve Cryptography and Smart Cards}} , author={{ AhmadKhaled } and { MAl-Kayali }} , booktitle={{SANS Instutute}} , year={2004} } @book{b14, , title={{A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards}} , author={{ AqeelKhalique } and { KuldipSingh } and { SandeepSood }} , year={May 2010} , publisher={IJCA} 2 } @incollection{b15, , title={{Privacy Preserving Multi-Factor Authentication with Biometrics}} , author={{ AnnaAbhilasha } and { ElisaSquicciarini } and { Bertino }} , booktitle={{DIM'06}} , year={November 3, 2006} } @incollection{b16, , title={{A Novel Remote User Authentication Scheme Using Smart Card based on ECDLP}} , author={{ DJena } and { SKJena } and { DMohanty } and { SKPanigrahy }} , booktitle={{IEEE Proceeding of International Conference on Advanced Computer Control}} , year={2008} } @book{b17, , title={{Modified Remote User Authentication Scheme using Smart Card based on ECDLP}} , author={{ DebasishJena } and { SanjaySaroj Kumar Panigrahy } and { SubhenduKumar Jena } and { Kumar Pani }} , year={2009, 28 -31 December 2009} , address={Sri Lanka} } @incollection{b18, , title={{A Novel Remote User Authentication Scheme using Smart Card with Biometric Based on ECDLP}} , author={{ K KGoyal } and { M SChahar }} , journal={{International Journal of Information Technology and Knowledge Management}} 4 2 , year={July-December 2011} } @incollection{b19, , title={{A Review of Smartcard Security Issues}} , author={{ Hoon } and { RonnieDCaytiles }} , journal={{Journal of Security Engineering}} , year={Jun-2011} } @book{b20, , title={{A Workload Characterization of Elliptic Curve Cryptography Methods in Embedded Environments}} , author={{ RBranovic } and { EGiorgi } and { Martinelli }} , year={June-2004} , publisher={ACM} 32 } @book{b21, , title={{Elliptic Curve for Data protection}} , author={{ AWasim } and { Al-Hamdani }} , year={Oct-2011} , note={Information Security Curriculum conference} }