Login / Signup
Securing M2M With Post-Quantum Public-Key Cryptography.
Jie-Ren Shih
Yongbo Hu
Ming-Chun Hsiao
Ming-Shing Chen
Wen-Chung Shen
Bo-Yin Yang
An-Yeu Wu
Chen-Mou Cheng
Published in:
IEEE J. Emerg. Sel. Topics Circuits Syst. (2013)
Keyphrases
</>
public key cryptography
public key
elliptic curve
authentication and key agreement
public key infrastructure
elliptic curve cryptography
security model
digital signature
security services
provably secure
information security
security analysis
signature scheme
database
real time
key technologies