A Participatory Verification security scheme for the Internet of Things.
Bogdan-Cosmin ChiforIon BicaVictor-Valeriu PatriciuPublished in: COMM (2016)
Keyphrases
- high security
- security analysis
- digital signature scheme
- java card
- protection scheme
- elliptic curve cryptography
- authentication scheme
- mobile devices
- security model
- key technologies
- access control
- identity based cryptography
- model checking
- key distribution
- information security
- signature verification
- ubiquitous computing
- statistical databases
- key agreement
- authentication mechanism
- security issues
- intrusion detection
- security requirements
- image encryption
- diffie hellman
- public key cryptography
- key agreement protocol
- signcryption scheme
- secure communication
- physical world
- private key
- high assurance
- integrity verification
- security properties
- authentication protocol