A symmetric neural cryptographic key generation scheme for Iot security.
Arindam SarkarPublished in: Appl. Intell. (2023)
Keyphrases
- key management
- key distribution
- secret sharing scheme
- secure communication
- elliptic curve cryptography
- security properties
- public key encryption
- security protocols
- encryption key
- identity based cryptography
- provably secure
- smart card
- security problems
- key agreement
- security requirements
- secret sharing
- elliptic curve
- security analysis
- wireless sensor networks
- authentication protocol
- diffie hellman
- authentication scheme
- ad hoc networks
- cryptographic protocols
- public key cryptography
- encryption decryption
- security model
- security services
- management system
- hash functions
- digital signature scheme
- random number generator
- neural network
- information security
- encryption scheme
- resource constrained
- protection schemes
- fuzzy vault
- access control
- high security
- security policies
- network security
- big data
- cryptographic algorithms
- cloud computing
- digital signature
- public key cryptosystem
- public key