2019
DOI: 10.1016/j.jisa.2019.04.004
|View full text |Cite
|
Sign up to set email alerts
|

Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…(b) The verification of GS. To verify that ∆ = (σ i,t , T i,t ) is the signature of CIN i for the message m at time t, GM can calculate (5)…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…(b) The verification of GS. To verify that ∆ = (σ i,t , T i,t ) is the signature of CIN i for the message m at time t, GM can calculate (5)…”
Section: Resultsmentioning
confidence: 99%
“…As for the perception layer of the IoT, due to its heterogeneity and complexity. It is very vulnerable to be attacked by criminals, resulting in security threats to the source of the perceptual data [4,5]. Ensuring the credibility of the perception nodes and the source of perception data is the cornerstone of ensuring the safe operation of the perception layer.…”
mentioning
confidence: 99%