A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack.
Emanuel Ferreira JesusVanessa R. L. ChicarinoCélio Vinicius N. de AlbuquerqueAntônio A. de A. RochaPublished in: Secur. Commun. Networks (2018)
Keyphrases
- key exchange protocol
- authentication mechanism
- security measures
- authentication protocol
- block cipher
- remote user authentication scheme
- information leakage
- smart card
- countermeasures
- secret key
- key technologies
- data encryption
- security management
- diffie hellman
- key agreement
- secure communication
- key exchange
- authentication scheme
- standard model
- identity management
- security issues
- cryptographic protocols
- security requirements
- ubiquitous computing
- encryption scheme