Towards End-to-End Data Protection in Low-Power Networks.
Computer Security Lecture Notes in Computer Science(2017)
Key words
Internet of Things,Low-power networks,End-to-end security,Data protection,Key management,Constrained devices,Edge computing
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined