An Empirical Review on Security Scheme in IOT.
Harpreet KaurTaiwo SoewuHarwinder Singh SohalMd Abu Hanif ResearchGurbinder SinghPublished in: ICCCNT (2023)
Keyphrases
- key management
- security problems
- identity based cryptography
- protection scheme
- digital signature scheme
- private key
- access control
- chosen plaintext
- key management scheme
- secure communication
- authentication scheme
- information security
- security analysis
- secret key
- authentication mechanism
- key distribution
- security properties
- elliptic curve cryptography
- management system
- intrusion detection
- security requirements
- security model
- authentication protocol
- security issues
- statistical databases
- high security
- blind signature scheme
- network security
- public key
- user authentication
- key agreement
- smart card
- public key encryption
- elliptic curve