1
results found
The rapid growth of the Internet of Things (IoT) introduces challenges in secure authentication and delegation due to the limited computational capabilities of devices. Proxy signature schemes offer ...
Isogeny-based public-key cryptography
IoT
proxy signature
post-quantum cryptography
elliptic curve cryptography
SinoXiv