Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption.
Kavitha S. PatilIndrajit MandalC. RangaswamyPublished in: Pervasive Mob. Comput. (2022)
Keyphrases
- key management
- public key cryptography
- encryption scheme
- encryption decryption
- secure communication
- security analysis
- data encryption
- management system
- smart card
- public key
- encryption key
- security protocols
- digital signature
- security services
- integrity verification
- stream cipher
- digital rights management
- user authentication
- security mechanisms
- resource constrained