Fixing User Authentication for the Internet of Things (IoT).
Hannes TschofenigPublished in: Datenschutz und Datensicherheit (2016)
Keyphrases
- user authentication
- smart objects
- big data
- location information
- mobile computing
- authentication scheme
- ubiquitous computing
- biometric authentication
- mobile devices
- keystroke dynamics
- cloud computing
- authentication protocol
- information security
- security analysis
- remote user authentication scheme
- biometric systems
- data management
- databases
- peer to peer
- low cost