Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
Computing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. In the particular case of a network of devices heterogeneous in terms of computing...
Saved in:
| Main Authors: | Dana Simian, Oana-Adriana Ticleanu, Nicolae Constantinescu |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-03-01
|
| Series: | Applied Sciences |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/15/6/3048 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Securing Authentication and Detecting Malicious Entities in Drone Missions
by: Nicolae Constantinescu, et al.
Published: (2024-12-01) -
Temperate Blind Signature Scheme for Particular Subspaces
by: Oana-Adriana Ticleanu, et al.
Published: (2025-06-01) -
Detecting Unusual Repetitive Patterns of Behavior Indicative of a Loop-Based Attack in IoT
by: Asmaa Munshi
Published: (2024-11-01) -
An Improved GN-AK Protocol Using Double-Base Scalar Multiplication and Point Halving over Elliptic Curves
by: Nicolae Constantinescu, et al.
Published: (2025-07-01) -
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
by: Khadeeja Gebor Salim, et al.
Published: (2021-06-01)