0
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation

      Proceedings 2019 Workshop on Decentralized IoT Systems and Security

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Author and article information

          Journal
          10.14722/diss.2019.23005

          Applied computer science,Computer science,Security & Cryptology
          Applied computer science, Computer science, Security & Cryptology

          Comments

          Comment on this article