Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECChttp://inet.haw-hamburg.de/papers/msw-feaci-15.pdf/viewhttp://inet.haw-hamburg.de/@@site-logo/inet-haw2.png
Federated End-to-End Authentication for the Constrained Internet of Things using IBC and ECC