An Asymmetric RSA-Based Security Approach for Opportunistic IoT.
Nisha KandhoulSanjay Kumar DhurandherPublished in: WIDECOM (2019)
Keyphrases
- security problems
- digital signature scheme
- information security
- key management
- elliptic curve
- elliptic curve cryptography
- public key cryptography
- management system
- key exchange
- public key
- private key
- cryptographic algorithms
- security issues
- security systems
- access control
- security requirements
- security mechanisms
- statistical databases
- intrusion detection
- network security
- data security
- security policies
- security services
- security level
- security properties
- signature scheme
- security protocols
- digital signature
- security model
- cyber security
- modular exponentiation
- computer security
- lightweight
- cloud computing