Multidomain security authentication for the Internet of things.
Qikun ZhangKunyuan ZhaoXiaohui KuangYongjiao LiYuanpan ZhengJunling YuanRuifang WangPublished in: Concurr. Comput. Pract. Exp. (2022)
Keyphrases
- security requirements
- security mechanisms
- user authentication
- identity authentication
- fuzzy vault
- authentication mechanism
- authentication protocol
- data encryption
- security analysis
- authentication systems
- factor authentication
- integrity verification
- biometric data
- security services
- encryption decryption
- access control
- virtual private network
- electronic payment
- authentication scheme
- smart card
- biometric authentication
- public key cryptography
- elliptic curve cryptography
- identity based cryptography
- statistical databases
- information security
- security systems
- biometric template
- security issues
- key agreement protocol
- network security
- security policies
- trust negotiation
- mobile devices
- key agreement
- public key
- secure communication
- mutual authentication
- public key infrastructure
- security protocols
- rfid technology
- multi domain
- biometric recognition
- key technologies
- security properties
- computer security
- physical world
- trusted third party
- key distribution
- image authentication
- intrusion detection
- security level