Elliptic Curve Cryptography in Constrained Environments: A Review | IEEE Conference Publication | IEEE Xplore