- Article
Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access
- Daoqi Han,
- Xiaofeng Du and
- Yueming Lu
Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and...