Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access
Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better ac...
Main Authors: | Daoqi Han, Xiaofeng Du, Yueming Lu |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-04-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/8/2231 |
Similar Items
-
Security aspects of zero knowledge identification schemes
by: Panait, Andreea Mihaela.
Published: (2008) -
A Survey on Blockchain Consensus with a Performance Comparison of PoW, PoS and Pure PoS
by: Cristian Lepore, et al.
Published: (2020-10-01) -
A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off
by: Miodrag J. Mihaljevic
Published: (2020-01-01) -
A Zero-Knowledge Proof System with Algebraic Geometry Techniques
by: Edgar González Fernández, et al.
Published: (2020-01-01) -
An access control model for the Internet of Things based on zero-knowledge token and blockchain
by: Lihua Song, et al.
Published: (2021-04-01)