Login / Signup
Security analysis of the constrained application protocol in the Internet of Things.
Thamer A. Alghamdi
Aboubaker Lasebae
Mahdi Aiash
Published in:
FGCT (2013)
Keyphrases
</>
security analysis
security requirements
security model
security properties
lightweight
public key
authentication protocol
key exchange
high security
mutual authentication
secure electronic
intelligent agents
smart card
cryptographic protocols
elliptic curve cryptography