Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Jun 19, 2023 · This paper proposes a strong identity authentication scheme based on SM9 cryptographic algorithm for the power Internet of Things without digital certificates ...
The invention relates to an internet of things terminal identity authentication method based on edge calculation, and provides a key management method based ...
People also ask
Jun 21, 2023 · Li et al. designed a lightweight grid authentication key protocol based on the stateful security SM9 algorithm and implemented it in code, which ...
The SM9 private key is split and then stored separately.When using the private key signature, a synthesizing signature is generated via an interactive ...
Missing: Strong Things
A Strong Identity Authentication Scheme for Electric Power Internet of Things Based on SM9 Algorithm. CISIS 2023: 200-209. [c2]. view. electronic edition via ...
Aug 1, 2020 · This paper proposes an authentication scheme based on the 2-adic ring algorithm, which is mainly applicable to the design architecture of the ...
Missing: Electric | Show results with:Electric
The asymmetric cryptographic algorithm can be used for realizing identity authentication and encryption and decryption functions of communication messages among ...
Aug 27, 2024 · A similar authentication scheme was proposed in [19] , which added the digital signature algorithm based on SM9 into the authentication process ...
Jan 10, 2018 · This paper proposes a novel method to provide a continuous authentication system using multisensor data both from motion and physiological ...
Feb 22, 2024 · This research proposes an innovative method for IoT identity authentication. The method is based on an improved ring-learning with errors (R-LWE) algorithm.
Missing: SM9 | Show results with:SM9