首页> 外文会议>Internet of Things North America Conference >An Efficient workflow for Implementing Public Key Cryptography (PKC) in Constrained Devices
【24h】

An Efficient workflow for Implementing Public Key Cryptography (PKC) in Constrained Devices

机译:用于在约束设备中实现公钥加密(PKC)的有效工作流程

获取原文

摘要

1. The nodes need to generate the public keys and private keys randomly... (1) Can use the A/D conversion of noise... 2. A number of public/private keys can be generated and will be shared with the gateway through the gateway's public key and then used for encryption and decryption. 3. Here the public keys of the nodes are kept as secrets.... (1) So no entity other than the gateway can control the node. (2) So control/command data to actuators are protected. 4. This helps in preventing eaves dropping and cracking of messages. (1) More to follow...
机译:1.节点需要随机生成公钥和私钥...(1)可以使用噪声的A / D转换... 2.可以生成许多公共/私钥,并将与之共享 网关通过网关的公钥,然后用于加密和解密。 3.这里,节点的公钥保存为秘密....(1)所以除了网关之外的实体可以控制节点。 (2)所以控制/命令数据到执行器受到保护。 这有助于防止屋檐下降和裂开消息。 (1)更多遵循......

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号