Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations

Computing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. In the particular case of a network of devices heterogeneous in terms of computing...

Full description

Saved in:
Bibliographic Details
Main Authors: Dana Simian, Oana-Adriana Ticleanu, Nicolae Constantinescu
Format: Article
Language:English
Published: MDPI AG 2025-03-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/15/6/3048
Tags: Add Tag
No Tags, Be the first to tag this record!