Cargando…
Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications
Digital certificates are regarded as the most secure and scalable way of implementing authentication services in the Internet today. They are used by most popular security protocols, including Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The lifecycle management of di...
Autores principales: | Astorga, Jasone, Barcelo, Marc, Urbieta, Aitor, Jacob, Eduardo |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9003447/ https://www.ncbi.nlm.nih.gov/pubmed/35408176 http://dx.doi.org/10.3390/s22072561 |
Ejemplares similares
-
Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain
por: Jeong, Yoon-Su
Publicado: (2022) -
Analysis of architectures implemented for IIoT
por: Oñate, William, et al.
Publicado: (2023) -
Trends and Challenges in AIoT/IIoT/IoT Implementation
por: Hou, Kun Mean, et al.
Publicado: (2023) -
Validation of High-Availability Model for Edge Devices and IIoT
por: Peniak, Peter, et al.
Publicado: (2023) -
StreamPipes Connect: Semantics-Based Edge Adapters for the IIoT
por: Zehnder, Philipp, et al.
Publicado: (2020)