Capstone Project Đồ án tốt nghiệp An toàn thông tin Information Assurance SP22IA09 End-to-End Elliptic Curve Cryptography Cryptography Elliptic Curve
In the development, IoT systems are now aiming to the full-automation operations. Machine-to-Machine communications play an important role to
achieve complete automation. If attackers are able to retrieve and exploit thesecommunications, it would be hard for the machines themselves to detect and defend against the threats. An IoT system that lacks encryption will be an easy
target for hackers to break through.