Login / Signup
Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications.
Pavol Zajac
Published in:
Sensors (2021)
Keyphrases
</>
management system
decision trees
key exchange protocol
tree models
hash functions
tree structure
cloud computing
big data
location information
secret key
tree structures
data model
tree construction
tree automata
authentication scheme
key exchange
neural network