Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECC

application/pdf msw-feaci-15.pdf — 250.9 KB