Authentication of IoT device and IoT server using security key
W Alnahari, MT Quasim - 2021 International Congress of …, 2021 - ieeexplore.ieee.org
IoT is an emerging topic in the field of IT that has attracted the interest of researchers from
different parts of the world. Authentication of IoT includes the establishment of a model for …
different parts of the world. Authentication of IoT includes the establishment of a model for …
{CSProp}: ciphertext and signature propagation {Low-Overhead}{Public-Key} cryptosystem for {IoT} environments
Cryptographic operations can be prohibitively expensive for IoT and other resource-
constrained devices. We introduce a new cryptographic primitive which we call Ciphertext …
constrained devices. We introduce a new cryptographic primitive which we call Ciphertext …
[图书][B] Network Attacks and Defenses for IoT Environments
FM Alharbi - 2020 - search.proquest.com
Security of resource-constrained edge devices, such as Internet of Thing (IoT) devices, is
one of the primary challenges facing the successful deployment of this potentially …
one of the primary challenges facing the successful deployment of this potentially …