Login / Signup
An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme.
Dong Xie
Jinghua Yang
Bin Wu
Weixin Bian
Fulong Chen
Taochun Wang
Published in:
IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases
</>
resource constrained
embedded systems
resource constraints
security mechanisms
wireless sensor networks
sensor networks
key management
key agreement protocol
key distribution
multipath
rfid tags
real time
data sets
secret sharing scheme
low cost