Authenticating Edge Neural Network through Hardware Security Modules and Quantum-Safe Key Management.
Swathi Kumar VembuAnupam ChattopadhyaySayandeep SahaPublished in: VLSID (2024)
Keyphrases
- key management
- neural network
- identity based cryptography
- security threats
- key management scheme
- resource constrained
- wireless sensor networks
- ad hoc networks
- key distribution
- security protocols
- key pre distribution
- security services
- low cost
- provably secure
- real time
- secure communication
- secret sharing scheme
- digital signature
- key establishment
- group communication
- computer systems
- secret key
- diffie hellman
- elliptic curve
- pairwise
- knn
- mobile ad hoc networks
- operating system