Login / Signup
A Secure Authentication and Access Control Scheme for CoAP-based IoT.
Muath A. Obaidat
Jian Lim Choong
Kutub Thakur
Published in:
CIoT (2022)
Keyphrases
</>
authentication and access control
authentication scheme
key distribution
key management
public key encryption
management system
databases
authentication protocol
access control
security analysis
security architecture
sensor networks
information security
security requirements
secret sharing scheme
provably secure