Login / Signup
Security Schemes for Constrained Application Protocol in IoT: A Precise Survey.
Amit Mali
Anant V. Nimkar
Published in:
SSCC (2017)
Keyphrases
</>
provably secure
cryptographic protocols
lightweight
intrusion detection
key management
security model
rfid systems
key agreement
database systems
security requirements
secret key
security analysis
security protocols
key agreement protocol