Please use this identifier to cite or link to this item:
http://13.232.72.61:8080/jspui/handle/123456789/276
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Thrupthi, V. | - |
dc.contributor.author | Nagaveni, V. | - |
dc.date.accessioned | 2018-09-24T04:22:55Z | - |
dc.date.available | 2018-09-24T04:22:55Z | - |
dc.date.issued | 2017-05 | - |
dc.identifier.citation | Thrupthi, V., & Nagaveni, V. (2017). A Detailed Survey on Identity-Based Key Encapsulation Mechanism, International Research Journal of Engineering and Technology, 4(5), 3249-3252. | en_US |
dc.identifier.issn | e-2395 -0056 | - |
dc.identifier.issn | p-2395-0072 | - |
dc.identifier.uri | http://13.232.72.61:8080/jspui/handle/123456789/276 | - |
dc.description.abstract | The main purpose of key distribution is to provide efficient and effective security to commence with security providing schema in view of smart devices in IOT generally focalize on cryptographic method. In established usage of key distribution mechanism in real-time system services, it is most often deficient to build multiple channels with strong security simultaneously on a single data server. Implementation of the IBKEM to our system and achieve anonymous key distribution with one-pass communication for clients in batch. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IRJET | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer terminals | en_US |
dc.title | A Detailed Survey on Identity-Based Key Encapsulation Mechanism | en_US |
dc.type | Article | en_US |
Appears in Collections: | Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A detailed Survey on Identity-Based Key Encapsulation Mechanism”, International Research Journal of Engineering and Technology.pdf | 660.72 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.