Login / Signup
Evaluating the performance of the OSCORE security protocol in constrained IoT environments.
Martin Gunnarsson
Joakim Brorsson
Francesca Palombini
Ludwig Seitz
Marco Tiloca
Published in:
Internet Things (2021)
Keyphrases
</>
security protocols
key management
security services
artificial immune algorithm
rfid systems
automated design
security mechanisms
authentication protocol
management system
query processing
cloud computing
digital libraries
data mining techniques
anomaly detection
security problems