3 -Asymmetric Key Cryptography

3 -Asymmetric Key Cryptography

Source publication
Preprint
Full-text available
Various devices are linked together through a variety of networks in order to exchange data in the Internet of Things (IoT). Life has changed dramatically as a result of the IoT's quickly developing applications, making it more fanciful and akin to living in a virtual environment. IoT security may be a major concern because it allows access to anyt...