Questioning the security and efficiency of the ESIoT approach Article Swipe
Related Concepts
Broadcast encryption
Computer science
Encryption
Anonymity
Computer security
Group key
Ciphertext
Mutual authentication
Computer network
Scalability
Authentication (law)
Public-key cryptography
Database
Aída Diop
,
Saïd Gharout
,
Maryline Laurent
,
Jean Leneutre
,
Jacques Traoré
·
YOU?
·
· 2018
· Open Access
·
· DOI: https://doi.org/10.1145/3212480.3212491
· OA: W2810511838
YOU?
·
· 2018
· Open Access
·
· DOI: https://doi.org/10.1145/3212480.3212491
· OA: W2810511838
International audience
Related Topics
Finding more related topics…