Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Yanjiang YangXuhua DingHaibing LuJian WengJianying ZhouPublished in: ISC (2013)
Keyphrases
- resource constrained
- security mechanisms
- embedded systems
- resource constraints
- sensor networks
- resource limitations
- rfid tags
- trust negotiation
- wireless sensor networks
- mobile devices
- visual sensor networks
- key management
- multipath
- access control
- low cost
- security analysis
- trusted platform module
- security protocols
- peer to peer
- evolutionary algorithm
- data sets