IoT Security: On-Chip Secure Deletion Scheme using ECC Modulation in IoT Appliances.
Na-Young AhnDong Hoon LeePublished in: CoRR (2023)
Keyphrases
- key management
- elliptic curve
- security analysis
- key management scheme
- key distribution
- elliptic curve cryptography
- security problems
- security requirements
- key agreement
- authentication scheme
- secret sharing scheme
- identity based cryptography
- provably secure
- secure communication
- diffie hellman
- public key cryptography
- high security
- security issues
- digital signature scheme
- management system
- public key encryption
- public key
- authentication protocol
- rfid systems
- ad hoc networks
- authentication mechanism
- key exchange
- security properties
- private key
- key establishment
- digital signature
- security model
- public key encryption scheme
- smart home
- security protocols
- cloud computing
- resource constrained
- security mechanisms
- mutual authentication
- key agreement protocol
- encryption scheme
- wireless sensor networks
- secret key
- public key cryptosystems
- security services
- data security
- cca secure
- smart card
- electronic voting
- secret sharing
- user authentication
- ubiquitous computing
- information security
- public key cryptosystem
- energy consumption
- encryption key
- stream cipher
- error correction
- protection scheme
- signcryption scheme
- blind signature
- security measures
- security level
- graphical password
- security policies
- context aware
- rights management
- standard model
- chosen plaintext