Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECChttp://www.inet.haw-hamburg.de/papers/msw-feaci-15.pdf/viewhttp://www.inet.haw-hamburg.de/@@site-logo/inet-haw2.png
Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECC