Login / Signup
Construction of elliptic curve cryptography-based authentication protocol for internet of things.
Deepak Chhikara
Saurabh Rana
Ankita Mishra
Dheerendra Mishra
Published in:
Secur. Priv. (2022)
Keyphrases
</>
authentication protocol
elliptic curve cryptography
public key
security analysis
authentication scheme
smart card
user authentication
high security
public key cryptography
lightweight
security requirements
secret key
digital signature
key distribution
encryption scheme
security protocols
signature scheme
elliptic curve
security mechanisms
key technologies
secure communication
digital watermark