A Scheme to Improve the Security of IoT Communication.
Junjie FuXiaoliang WangYuzhen LiuQing YangFrank JiangPublished in: ICAIS (3) (2022)
Keyphrases
- key management
- digital signature scheme
- identity based cryptography
- intrusion detection
- information security
- management system
- security problems
- secure communication
- secret sharing scheme
- smart objects
- data encryption
- protection scheme
- high security
- information processing systems
- security analysis
- security requirements
- statistical databases
- computer networks
- data management