Login / Signup
Activation of LoRaWAN End Devices by Using Public Key Cryptography.
Fredrik Mårlind
Ismail Butun
Published in:
CSNet (2020)
Keyphrases
</>
public key cryptography
public key
elliptic curve
authentication and key agreement
public key infrastructure
mobile devices
digital signature
provably secure
security model
security services
real time
elliptic curve cryptography
database
security analysis