Login / Signup
Secure dynamic authentication of passive assets and passive IoTs using self-powered timers.
Liang Zhou
Shantanu Chakrabartty
Published in:
ISCAS (2017)
Keyphrases
</>
security requirements
security mechanisms
user authentication
dynamic environments
authentication scheme
password authentication
key distribution
lightweight
data encryption
encryption decryption