Efficient security algorithm for power-constrained IoT devices
JN Mamvong, GL Goteng, B Zhou… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices characterized by low power and low processing capabilities
do not exactly fit into the provision of existing security techniques due to their constrained …
do not exactly fit into the provision of existing security techniques due to their constrained …
Efficient Security Algorithm for Power Constrained IoT Devices
JN Mamvong, GL Goteng… - IEEE Internet of Things …, 2020 - researchonline.ljmu.ac.uk
Internet of Things (IoT) devices characterized by low power and low processing capabilities
do not exactly fit into the provision of existing security techniques, due to their constrained …
do not exactly fit into the provision of existing security techniques, due to their constrained …