Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
Sensors (Basel, Switzerland)(2025)
Key words
anonymity,authentication and key agreement,traffic pattern,periodic update pattern,remote control pattern,desynchronization,internet of things
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined