A new approach on IoT security: n-out-of-n.
Tugberk KocatekinCafer ÇaliskanPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- security problems
- information security
- key management
- access control
- security issues
- management system
- security policies
- security requirements
- computer security
- network security
- security mechanisms
- intrusion detection
- cloud computing
- statistical databases
- security vulnerabilities
- security systems
- security management
- network management
- elliptic curve
- authentication protocol
- security level
- rfid systems