Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things.
Vivek V. JogT. Senthil MuruganPublished in: Int. J. Intell. Comput. Cybern. (2017)
Keyphrases
- elliptic curve cryptography
- authentication scheme
- elliptic curve
- security analysis
- cryptographic algorithms
- public key
- public key cryptography
- high security
- error correction
- digital watermark
- security mechanisms
- user authentication
- public key cryptosystems
- smart card
- private key
- security model
- image encryption
- digital signature
- authentication protocol
- key management
- security requirements
- security services
- security properties
- provably secure
- digital watermarking
- public key infrastructure
- secret key