Login / Signup

Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things.

Guicheng ShenZhen Yu
Published in: IIH-MSP (2013)
Keyphrases
  • elliptic curve cryptography
  • key technologies
  • authentication scheme
  • image processing