%PDF-1.4
%
1 0 obj
<>stream
Attribute-based encryption,Internet of Things,IoT security protocols,Multicast security,Resource-constrained devices
iText 4.2.0 by 1T3XT
application/pdf
10.1080/02564602.2017.1407681
en
Taylor & Francis
IETE Technical Review, 2018. doi:10.1080/02564602.2017.1407681
Attribute-based encryption
Internet of Things
IoT security protocols
Multicast security
Resource-constrained devices
Securing Multicast Group Communication in IoT-Enabled Systems
Subho Shankar Basu
Somanath Tripathy
Journal
IETE Technical Review
Copyright 2018 Taylor & Francis
0256-4602
0974-5971
0
0
1
11
10.1080/02564602.2017.1407681
https://doi.org/10.1080/02564602.2017.1407681
VoR
2018-03-13T18:47:33+05:30
Arbortext Advanced Print Publisher 10.0.1062/W Unicode
2018-03-21T01:47:27-07:00
2018-03-21T01:47:27-07:00
uuid:1d1b4747-5ef6-4a3c-b4a1-91b602f51d8f
uuid:334f4264-d461-4e33-972f-acdc62ad32b1
10.1080/02564602.2017.1407681https://doi.org/10.1080/02564602.2017.14076812018-03-20truewww.tandfonline.com10.1080/02564602.2017.1407681www.tandfonline.comtrue2018-03-2010.1080/02564602.2017.1407681
endstream
endobj
4 0 obj
<>stream
xXn7SH?P-ڦ=-K_$Ej4cI݃aȳCI~ÿoQC._썏6<5zÇeȭLp6Zs<\@fp֟rE
ʬwu Tw8>|@.y545Z{d4Z&$(8cPtܙJWdY~z҄UrcAKf
hEezk:jydYO^nmɡL8:EEヷ'y4J%}-W~u˫Hu%&1VGLB4?~wxjspL_l`kiD!&\@lYVޜ]u:c1DĬW5ɊKe_b5?h TGh}xC!d5KEpyꅅ!pG3ZOR6w/R܋W҈E~p:
1-߿MY?2l*/\eWKZ\C;Z-Z6U:WJVAkЦ(;rPZek^k\s̆#*p`r
=yn)qh72xIz/[{@s!L
U?Ѝ
Fm͏
JŖn2*ߑo0TJ2 jKbT6Ҳw@yхe=.{?(nTUfmܭ6ѱ.M{Uu?aD7)bVzq_)MZ^7EID 骴qYҽcqJЋ
+{1G"f*(*\.hh%텴X0\jr/3\pԞ(3}s}͑彚+SzZ)V#ϰlZ OPbVNP]|()ZөH͟w--$mQ4هMA~O4 e=! =xW^D=8ʡȄ]QlRfK.XS(tjy.J$9=ۍބϻ/ղ]"n4rk=483'uw( }xD<%EAW@]ߡ`a눗;z\B| 4*x!/LLlf-qDto
KcFct7 =[E#(_r?e:4C-
nCb7-~uővZْDԍ^vD&l3n:)FC|M@bʖƢU+ZCtu2.b˗ZsA;M1e*#jՖګ@VBC)v^ߓ-YU- j^tvKq:,ڜB}֙!9q/|3|YWP[Úԫ;ܷ
>U-Ӟl%O߿Y+ž
endstream
endobj
24 0 obj
<>stream
xwXSsN`$!l{@ ٢ $@TR)XZԉ(
RZD|y L0V@(#q `= nnWXX0+Зȕ;ѫ R1{Ol (Lγx\䜙/V'LKP0RX~@9k(8u?̰yBOΑr y
<)_Έ"<?_l)
F+s9H
MI #~__ Q$.R$sŅg%f,a6GTLΟEQԖ!/Bſ)EogEA?l kJ^-ؒ \?l{ P&d\EAt{6~/ÇfJq2bFn6g0<8aO"yD|TyE