A CRC-Based Authentication Model and ECC-Based Authentication Protocol for Resource-Constrained IoT Applications

Ismail Keshta. A CRC-Based Authentication Model and ECC-Based Authentication Protocol for Resource-Constrained IoT Applications. IEEE Access, 12:156765-156784, 2024. [doi]

Abstract

Abstract is missing.