Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices.
Xiaopeng LiFengyao YanFei ZuoQiang ZengLannan LuoPublished in: MobiCom (2019)
Keyphrases
- authentication mechanism
- user authentication
- authentication scheme
- key distribution
- authentication protocol
- security mechanisms
- identity management
- data encryption
- key management
- password authentication
- security analysis
- security requirements
- integrity verification
- factor authentication
- cloud computing
- secure manner
- management system
- secure communication
- smart card
- security services
- smart objects
- identity authentication
- mobile devices
- rfid tags
- private key
- public key cryptography
- key agreement protocol
- encryption decryption
- secret key
- mobile agent system
- security issues
- public key infrastructure
- public key
- rights management
- key agreement
- key exchange protocol
- public key encryption
- mutual authentication
- biometric authentication
- input device
- embedded systems
- digital signature
- big data
- access control
- electronic payment
- image authentication
- mobile terminals
- resource constrained