1 results found

Somnath Kumar, Kunal Dey, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Shehzad Ashraf Chaudhry

 The rapid growth of the Internet of Things (IoT) introduces challenges in secure authentication and delegation due to the limited computational capabilities of devices. Proxy signature schemes offer ...

Scientific Reports 2026-04-23 rs-9295947
Isogeny-based public-key cryptography IoT proxy signature post-quantum cryptography elliptic curve cryptography
Back to Top
Home
Browse
Submit
About
0.093975s