An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2020-03

AUTHORS

O. R. Vincent, T. M. Okediran, A. A. Abayomi-Alli, O. J. Adeniran

ABSTRACT

Security breaches have been observed in different dimensions in mobile payment system. The violation of user’s privacy is a common phenomenon in mobile payment transactions. This study presents an improved security scheme for a mobile payment system using elliptic curve cryptography over a binary field with International Mobile Equipment Identity to ensure higher security. The scheme uses a payment gateway for registration and maps all input text to elliptic curve points using ASCII values. Payment details are stored on the gateway, which is encrypted but decrypted only with merchant’s decryption key. The proposed scheme was evaluated in terms of key size, security strength, computational power, memory capacity, encryption and decryption time and mobile phone battery. The result shows that the scheme provides integrity, confidentiality and privacy. The result also shows that the proposed scheme is time-efficient and computationally inexpensive for resource-constrained environment like mobile payment system. More... »

PAGES

112

References to SciGraph publications

  • 2017-04-16. Design of Secure and Efficient Electronic Payment System for Mobile Users in MATHEMATICS AND COMPUTING
  • 2016-12. Towards privacy-preserving user targeting in JOURNAL OF COMMUNICATIONS AND INFORMATION NETWORKS
  • 2016-11-04. Design of electronic payment system based on authenticated key exchange in ELECTRONIC COMMERCE RESEARCH
  • 2016-04-08. Provably Secure Pairing-Free Identity-Based Partially Blind Signature Scheme and Its Application in Online E-cash System in ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
  • 2018-06-28. Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors in JOURNAL OF CRYPTOLOGY
  • 2018-04-25. Koblitz Curves over Quadratic Fields in JOURNAL OF CRYPTOLOGY
  • 2016-11-10. Privacy Protection in Mobile Recommender Systems: A Survey in SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE
  • 2011-12-31. A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs) in ELECTRONIC COMMERCE RESEARCH
  • 2011. Improving Smart Card Security Using Elliptic Curve Cryptography over Prime Field (Fp) in SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING 2011
  • 2012. Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations in INFORMATION SECURITY TECHNOLOGY FOR APPLICATIONS
  • 2013-02-22. Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model in COMPUTING
  • 2000. Software Implementation of Elliptic Curve Cryptography over Binary Fields in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS — CHES 2000
  • 2015-06-25. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography in ELECTRONIC COMMERCE RESEARCH
  • 2010-03-24. Improving e-payment security using Elliptic Curve Cryptosystem in ELECTRONIC COMMERCE RESEARCH
  • 2014-09-19. An anonymous mobile payment protocol based on SWPP in ELECTRONIC COMMERCE RESEARCH
  • 2017-11-30. A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system in THE JOURNAL OF SUPERCOMPUTING
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s42979-020-00122-1

    DOI

    http://dx.doi.org/10.1007/s42979-020-00122-1

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1126105927


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computation Theory and Mathematics", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Department of Computer Science, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria", 
              "id": "http://www.grid.ac/institutes/grid.448723.e", 
              "name": [
                "Department of Computer Science, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Vincent", 
            "givenName": "O. R.", 
            "id": "sg:person.012654341725.74", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012654341725.74"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of Computer Science, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria", 
              "id": "http://www.grid.ac/institutes/grid.448723.e", 
              "name": [
                "Department of Computer Science, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Okediran", 
            "givenName": "T. M.", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of Computer Science, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria", 
              "id": "http://www.grid.ac/institutes/grid.448723.e", 
              "name": [
                "Department of Computer Science, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Abayomi-Alli", 
            "givenName": "A. A.", 
            "id": "sg:person.015726013137.43", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015726013137.43"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of Mathematics, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria", 
              "id": "http://www.grid.ac/institutes/grid.448723.e", 
              "name": [
                "Department of Mathematics, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Adeniran", 
            "givenName": "O. J.", 
            "id": "sg:person.016452755171.47", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016452755171.47"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/s00145-018-9294-z", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1103637929", 
              "https://doi.org/10.1007/s00145-018-9294-z"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-29615-4_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013119891", 
              "https://doi.org/10.1007/978-3-642-29615-4_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10660-015-9192-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011630783", 
              "https://doi.org/10.1007/s10660-015-9192-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11227-017-2204-6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093093578", 
              "https://doi.org/10.1007/s11227-017-2204-6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44499-8_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007259557", 
              "https://doi.org/10.1007/3-540-44499-8_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00607-013-0306-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013555197", 
              "https://doi.org/10.1007/s00607-013-0306-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s13369-016-2115-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038331162", 
              "https://doi.org/10.1007/s13369-016-2115-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf03391577", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1085088815", 
              "https://doi.org/10.1007/bf03391577"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10660-011-9086-0", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023825810", 
              "https://doi.org/10.1007/s10660-011-9086-0"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-22288-7_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002625374", 
              "https://doi.org/10.1007/978-3-642-22288-7_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10660-014-9151-6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034375540", 
              "https://doi.org/10.1007/s10660-014-9151-6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-981-10-4642-1_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084846242", 
              "https://doi.org/10.1007/978-981-10-4642-1_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-49148-6_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023186813", 
              "https://doi.org/10.1007/978-3-319-49148-6_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-018-9298-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1105193476", 
              "https://doi.org/10.1007/s00145-018-9298-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10660-016-9246-3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001073545", 
              "https://doi.org/10.1007/s10660-016-9246-3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10660-010-9047-z", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048987213", 
              "https://doi.org/10.1007/s10660-010-9047-z"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2020-03", 
        "datePublishedReg": "2020-03-01", 
        "description": "Security breaches have been observed in different dimensions in mobile payment system. The violation of user\u2019s privacy is a common phenomenon in mobile payment transactions. This study presents an improved security scheme for a mobile payment system using elliptic curve cryptography over a binary field with International Mobile Equipment Identity to ensure higher security. The scheme uses a payment gateway for registration and maps all input text to elliptic curve points using ASCII values. Payment details are stored on the gateway, which is encrypted but decrypted only with merchant\u2019s decryption key. The proposed scheme was evaluated in terms of key size, security strength, computational power, memory capacity, encryption and decryption time and mobile phone battery. The result shows that the scheme provides integrity, confidentiality and privacy. The result also shows that the proposed scheme is time-efficient and computationally inexpensive for resource-constrained environment like mobile payment system.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s42979-020-00122-1", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1363502", 
            "issn": [
              "2662-995X", 
              "2661-8907"
            ], 
            "name": "SN Computer Science", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "1"
          }
        ], 
        "keywords": [
          "mobile payment systems", 
          "elliptic curve cryptography", 
          "decryption key", 
          "improved security scheme", 
          "mobile payment security", 
          "International Mobile Equipment Identity", 
          "mobile payment transactions", 
          "elliptic curve points", 
          "payment system", 
          "resource-constrained environments", 
          "user privacy", 
          "decryption time", 
          "security strength", 
          "payment gateway", 
          "security breaches", 
          "payment details", 
          "security scheme", 
          "payment security", 
          "high security", 
          "payment transactions", 
          "computational power", 
          "Equipment Identity", 
          "key size", 
          "ASCII values", 
          "input text", 
          "privacy", 
          "binary field", 
          "curve points", 
          "cryptography", 
          "gateway", 
          "phone battery", 
          "security", 
          "scheme", 
          "mobile phone batteries", 
          "memory capacity", 
          "encryption", 
          "confidentiality", 
          "system", 
          "transactions", 
          "breach", 
          "different dimensions", 
          "registration", 
          "key", 
          "text", 
          "environment", 
          "maps", 
          "violation", 
          "results", 
          "detail", 
          "terms", 
          "integrity", 
          "power", 
          "common phenomenon", 
          "point", 
          "time", 
          "field", 
          "dimensions", 
          "identity", 
          "size", 
          "capacity", 
          "values", 
          "batteries", 
          "phenomenon", 
          "study", 
          "strength"
        ], 
        "name": "An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security", 
        "pagination": "112", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1126105927"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s42979-020-00122-1"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s42979-020-00122-1", 
          "https://app.dimensions.ai/details/publication/pub.1126105927"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-12-01T06:41", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/article/article_842.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s42979-020-00122-1"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s42979-020-00122-1'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s42979-020-00122-1'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s42979-020-00122-1'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s42979-020-00122-1'


     

    This table displays all metadata directly associated to this object as RDF triples.

    212 TRIPLES      21 PREDICATES      107 URIs      82 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s42979-020-00122-1 schema:about anzsrc-for:08
    2 anzsrc-for:0802
    3 anzsrc-for:0804
    4 schema:author N4314707781eb4198aca851085080b94c
    5 schema:citation sg:pub.10.1007/3-540-44499-8_1
    6 sg:pub.10.1007/978-3-319-49148-6_26
    7 sg:pub.10.1007/978-3-642-22288-7_11
    8 sg:pub.10.1007/978-3-642-29615-4_18
    9 sg:pub.10.1007/978-981-10-4642-1_4
    10 sg:pub.10.1007/bf03391577
    11 sg:pub.10.1007/s00145-018-9294-z
    12 sg:pub.10.1007/s00145-018-9298-8
    13 sg:pub.10.1007/s00607-013-0306-4
    14 sg:pub.10.1007/s10660-010-9047-z
    15 sg:pub.10.1007/s10660-011-9086-0
    16 sg:pub.10.1007/s10660-014-9151-6
    17 sg:pub.10.1007/s10660-015-9192-5
    18 sg:pub.10.1007/s10660-016-9246-3
    19 sg:pub.10.1007/s11227-017-2204-6
    20 sg:pub.10.1007/s13369-016-2115-5
    21 schema:datePublished 2020-03
    22 schema:datePublishedReg 2020-03-01
    23 schema:description Security breaches have been observed in different dimensions in mobile payment system. The violation of user’s privacy is a common phenomenon in mobile payment transactions. This study presents an improved security scheme for a mobile payment system using elliptic curve cryptography over a binary field with International Mobile Equipment Identity to ensure higher security. The scheme uses a payment gateway for registration and maps all input text to elliptic curve points using ASCII values. Payment details are stored on the gateway, which is encrypted but decrypted only with merchant’s decryption key. The proposed scheme was evaluated in terms of key size, security strength, computational power, memory capacity, encryption and decryption time and mobile phone battery. The result shows that the scheme provides integrity, confidentiality and privacy. The result also shows that the proposed scheme is time-efficient and computationally inexpensive for resource-constrained environment like mobile payment system.
    24 schema:genre article
    25 schema:isAccessibleForFree false
    26 schema:isPartOf N009ece44b177484d969a5a1b95f62446
    27 Nbc3b2160e0f54ad5a55ff5d709c502a4
    28 sg:journal.1363502
    29 schema:keywords ASCII values
    30 Equipment Identity
    31 International Mobile Equipment Identity
    32 batteries
    33 binary field
    34 breach
    35 capacity
    36 common phenomenon
    37 computational power
    38 confidentiality
    39 cryptography
    40 curve points
    41 decryption key
    42 decryption time
    43 detail
    44 different dimensions
    45 dimensions
    46 elliptic curve cryptography
    47 elliptic curve points
    48 encryption
    49 environment
    50 field
    51 gateway
    52 high security
    53 identity
    54 improved security scheme
    55 input text
    56 integrity
    57 key
    58 key size
    59 maps
    60 memory capacity
    61 mobile payment security
    62 mobile payment systems
    63 mobile payment transactions
    64 mobile phone batteries
    65 payment details
    66 payment gateway
    67 payment security
    68 payment system
    69 payment transactions
    70 phenomenon
    71 phone battery
    72 point
    73 power
    74 privacy
    75 registration
    76 resource-constrained environments
    77 results
    78 scheme
    79 security
    80 security breaches
    81 security scheme
    82 security strength
    83 size
    84 strength
    85 study
    86 system
    87 terms
    88 text
    89 time
    90 transactions
    91 user privacy
    92 values
    93 violation
    94 schema:name An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security
    95 schema:pagination 112
    96 schema:productId Na2ea6d2fd14f46cd9352b57dcd0fd050
    97 Nd8a837cd3c184009b2116318d441d359
    98 schema:sameAs https://app.dimensions.ai/details/publication/pub.1126105927
    99 https://doi.org/10.1007/s42979-020-00122-1
    100 schema:sdDatePublished 2022-12-01T06:41
    101 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    102 schema:sdPublisher N1166646fb2fc4e6a888b4dadf2c8a44d
    103 schema:url https://doi.org/10.1007/s42979-020-00122-1
    104 sgo:license sg:explorer/license/
    105 sgo:sdDataset articles
    106 rdf:type schema:ScholarlyArticle
    107 N009ece44b177484d969a5a1b95f62446 schema:issueNumber 2
    108 rdf:type schema:PublicationIssue
    109 N1166646fb2fc4e6a888b4dadf2c8a44d schema:name Springer Nature - SN SciGraph project
    110 rdf:type schema:Organization
    111 N3038c83674b7495fbc70b24a5b03d353 rdf:first sg:person.015726013137.43
    112 rdf:rest Ndc68807ed1564765a73511b0f10eaa48
    113 N4314707781eb4198aca851085080b94c rdf:first sg:person.012654341725.74
    114 rdf:rest N7148ae1f94eb418eae13c1ab3b02ab4f
    115 N7148ae1f94eb418eae13c1ab3b02ab4f rdf:first Nd7b3e48e687c47aa82e68d5eeb5c9a6b
    116 rdf:rest N3038c83674b7495fbc70b24a5b03d353
    117 Na2ea6d2fd14f46cd9352b57dcd0fd050 schema:name doi
    118 schema:value 10.1007/s42979-020-00122-1
    119 rdf:type schema:PropertyValue
    120 Nbc3b2160e0f54ad5a55ff5d709c502a4 schema:volumeNumber 1
    121 rdf:type schema:PublicationVolume
    122 Nd7b3e48e687c47aa82e68d5eeb5c9a6b schema:affiliation grid-institutes:grid.448723.e
    123 schema:familyName Okediran
    124 schema:givenName T. M.
    125 rdf:type schema:Person
    126 Nd8a837cd3c184009b2116318d441d359 schema:name dimensions_id
    127 schema:value pub.1126105927
    128 rdf:type schema:PropertyValue
    129 Ndc68807ed1564765a73511b0f10eaa48 rdf:first sg:person.016452755171.47
    130 rdf:rest rdf:nil
    131 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    132 schema:name Information and Computing Sciences
    133 rdf:type schema:DefinedTerm
    134 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
    135 schema:name Computation Theory and Mathematics
    136 rdf:type schema:DefinedTerm
    137 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    138 schema:name Data Format
    139 rdf:type schema:DefinedTerm
    140 sg:journal.1363502 schema:issn 2661-8907
    141 2662-995X
    142 schema:name SN Computer Science
    143 schema:publisher Springer Nature
    144 rdf:type schema:Periodical
    145 sg:person.012654341725.74 schema:affiliation grid-institutes:grid.448723.e
    146 schema:familyName Vincent
    147 schema:givenName O. R.
    148 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012654341725.74
    149 rdf:type schema:Person
    150 sg:person.015726013137.43 schema:affiliation grid-institutes:grid.448723.e
    151 schema:familyName Abayomi-Alli
    152 schema:givenName A. A.
    153 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015726013137.43
    154 rdf:type schema:Person
    155 sg:person.016452755171.47 schema:affiliation grid-institutes:grid.448723.e
    156 schema:familyName Adeniran
    157 schema:givenName O. J.
    158 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016452755171.47
    159 rdf:type schema:Person
    160 sg:pub.10.1007/3-540-44499-8_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007259557
    161 https://doi.org/10.1007/3-540-44499-8_1
    162 rdf:type schema:CreativeWork
    163 sg:pub.10.1007/978-3-319-49148-6_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023186813
    164 https://doi.org/10.1007/978-3-319-49148-6_26
    165 rdf:type schema:CreativeWork
    166 sg:pub.10.1007/978-3-642-22288-7_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002625374
    167 https://doi.org/10.1007/978-3-642-22288-7_11
    168 rdf:type schema:CreativeWork
    169 sg:pub.10.1007/978-3-642-29615-4_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013119891
    170 https://doi.org/10.1007/978-3-642-29615-4_18
    171 rdf:type schema:CreativeWork
    172 sg:pub.10.1007/978-981-10-4642-1_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084846242
    173 https://doi.org/10.1007/978-981-10-4642-1_4
    174 rdf:type schema:CreativeWork
    175 sg:pub.10.1007/bf03391577 schema:sameAs https://app.dimensions.ai/details/publication/pub.1085088815
    176 https://doi.org/10.1007/bf03391577
    177 rdf:type schema:CreativeWork
    178 sg:pub.10.1007/s00145-018-9294-z schema:sameAs https://app.dimensions.ai/details/publication/pub.1103637929
    179 https://doi.org/10.1007/s00145-018-9294-z
    180 rdf:type schema:CreativeWork
    181 sg:pub.10.1007/s00145-018-9298-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1105193476
    182 https://doi.org/10.1007/s00145-018-9298-8
    183 rdf:type schema:CreativeWork
    184 sg:pub.10.1007/s00607-013-0306-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013555197
    185 https://doi.org/10.1007/s00607-013-0306-4
    186 rdf:type schema:CreativeWork
    187 sg:pub.10.1007/s10660-010-9047-z schema:sameAs https://app.dimensions.ai/details/publication/pub.1048987213
    188 https://doi.org/10.1007/s10660-010-9047-z
    189 rdf:type schema:CreativeWork
    190 sg:pub.10.1007/s10660-011-9086-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023825810
    191 https://doi.org/10.1007/s10660-011-9086-0
    192 rdf:type schema:CreativeWork
    193 sg:pub.10.1007/s10660-014-9151-6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034375540
    194 https://doi.org/10.1007/s10660-014-9151-6
    195 rdf:type schema:CreativeWork
    196 sg:pub.10.1007/s10660-015-9192-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011630783
    197 https://doi.org/10.1007/s10660-015-9192-5
    198 rdf:type schema:CreativeWork
    199 sg:pub.10.1007/s10660-016-9246-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001073545
    200 https://doi.org/10.1007/s10660-016-9246-3
    201 rdf:type schema:CreativeWork
    202 sg:pub.10.1007/s11227-017-2204-6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093093578
    203 https://doi.org/10.1007/s11227-017-2204-6
    204 rdf:type schema:CreativeWork
    205 sg:pub.10.1007/s13369-016-2115-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038331162
    206 https://doi.org/10.1007/s13369-016-2115-5
    207 rdf:type schema:CreativeWork
    208 grid-institutes:grid.448723.e schema:alternateName Department of Computer Science, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria
    209 Department of Mathematics, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria
    210 schema:name Department of Computer Science, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria
    211 Department of Mathematics, College of Physical Sciences, Federal University of Agriculture, Abeokuta, Ogun State, Nigeria
    212 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...