Era of Ambivalent IoT: Are we secure?
Anitha ChennamaneniVikram S. BhadauriaPublished in: AMCIS (2020)
Keyphrases
- big data
- key management
- management system
- security problems
- data security
- rfid systems
- cloud computing
- security requirements
- social media
- data management
- key distribution
- security issues
- neural network
- group communication
- database
- security protocols
- security mechanisms
- standard model
- ubiquitous computing
- ad hoc networks
- data processing
- diffie hellman
- scalar product