Low-cost client-side encryption and secure Internet of things (IoT) provisioning.
Joseph N. MamvongGokop GotengYue GaoPublished in: Frontiers Comput. Sci. (2022)
Keyphrases
- low cost
- key management
- cloud computing
- key exchange
- encryption scheme
- data encryption
- big data
- digital signature
- security properties
- ad hoc networks
- rfid tags
- cryptographic protocols
- rfid systems
- resource constrained
- highly efficient
- key distribution
- quality of service
- security issues
- smart objects
- security analysis
- rfid technology
- wireless sensor networks
- private key
- public key cryptography
- mutual authentication
- mobile devices
- secure communication
- integrity verification
- management system
- stream cipher
- digital rights management
- public key
- web applications
- location information
- web browser
- data confidentiality
- key technologies
- mobile computing
- secret key
- security protocols
- encryption decryption
- open standards
- secret sharing scheme
- ubiquitous computing
- provably secure
- real time
- authentication scheme
- diffie hellman
- elliptic curve
- security mechanisms
- smart card
- resource management
- cryptographic algorithms
- user authentication
- encryption algorithm
- advanced encryption standard
- security services
- security requirements
- elliptic curve cryptography
- authentication protocol