Login / Signup
Practical deniable authentication for pervasive computing environments.
Fagen Li
Jiaojiao Hong
Anyembe Andrew Omala
Published in:
Wirel. Networks (2018)
Keyphrases
</>
authentication protocol
pervasive computing environments
smart card
security analysis
lightweight
computing environments
service discovery
pervasive computing
security protocols
database systems
public key
hash functions
security requirements