Return to Article Details Analysis of Using Elliptic Curve Cryptography in Authentication Systems in IoT Download Download PDF