Login / Signup

Secure dynamic authentication of passive assets and passive IoTs using self-powered timers.

Liang ZhouShantanu Chakrabartty
Published in: ISCAS (2017)
Keyphrases
  • security requirements
  • security mechanisms
  • user authentication
  • dynamic environments
  • authentication scheme
  • password authentication
  • key distribution
  • lightweight
  • data encryption
  • encryption decryption