Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol

碩士 === 國立交通大學 === 電機資訊國際學程 === 105 === IoT applications often work with sensitive data and are made up of a large number of constrained devices. These characters require that IoT applications must have a robust and scalable security solution. In this case, public-key cryptography can be the best cho...

Full description

Bibliographic Details
Main Authors: HA, DUY AN, 河惟安
Other Authors: Zao, John Kar Kin
Format: Others
Language:en_US
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/81819469752798560149