Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm
Keywords:
Visio, Challenges, Applications, ArchitectureAbstract
Internet of Things is a new pattern which provides a set of new services for the next form of technological development. IOT in the sense, it is a “universal global neural network” in the cloud which connects various things. The form of communication that is either human-device, or human-human but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M). This paper aims to provide a future vision , IoT Architecture , Applications and its Challenges
References
Y. Amir, Y.Kim, C. Nita-Rotaru, “Secure communication using contributory key agreement”, IEEE Transactions on Parallel and Distributed systems, pp. 468-480,2009.
M. Bellare, D. Pointcheval, P. Rogaway, ” Authenticated Key exchange secure against dictionary attacks”, IN Proc. Of Eurocrypt, pp. 139-155.2010
S. Blakke Wilson, A. Menezes, “ Entity authentication and authenticated transport protocols employing asymmetric techniques”, SPRINGER 1997
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
