Realization of smart home key management mechanism based on ECC
At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on EC...
Saved in:
Main Authors: | Wenbin CHENG, Jia LIU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2017-06-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017195/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
by: Tarun Kumar, et al.
Published: (2025-01-01) -
Research and simulation of timing attacks on ECC
by: Hui-hui JIA, et al.
Published: (2016-04-01) -
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
by: Hyeon Choe, et al.
Published: (2025-01-01) -
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
by: Ijaz Khalid, et al.
Published: (2022-01-01) -
Efficient traceable identity-based signature scheme
by: DU Hong-zhen1, et al.
Published: (2009-01-01)