UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ITU-T X.1365

Security methodology for the use of identity-based cryptography in support of Internet of things (IoT) services over telecommunication networks

active, Most Current
Buy Now
Organization: ITU-T
Publication Date: 1 March 2020
Status: active
Page Count: 68
scope:

This Recommendation specifies a security methodology for the use of identity-based cryptography (IBC) technology in support of Internet of things (IoT) services over telecommunications networks. This security methodology includes mechanisms for device identification, private key issue, public parameter lookup and authentication protocols.

NOTE - This methodology is not limited to IoT service, it can be used by other services also.

Document History

ITU-T X.1365
March 1, 2020
Security methodology for the use of identity-based cryptography in support of Internet of things (IoT) services over telecommunication networks
This Recommendation specifies a security methodology for the use of identity-based cryptography (IBC) technology in support of Internet of things (IoT) services over telecommunications networks. This...

References

Advertisement