Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC.
Tobias MarkmannThomas C. SchmidtMatthias WählischPublished in: SIGCOMM (2015)
Keyphrases
- end to end
- elliptic curve cryptography
- security analysis
- admission control
- wireless ad hoc networks
- authentication scheme
- ad hoc networks
- multipath
- error correction
- elliptic curve
- high bandwidth
- mobile devices
- congestion control
- distributed systems
- public key cryptography
- user authentication
- smart card
- application layer
- scalable video
- rate allocation
- cloud computing
- internet protocol
- content delivery