An Authentication-Based Secure IJTAG Network.
Shih-Chun YehKuen-Jong LeeDong-Yi ChenPublished in: ATS (2022)
Keyphrases
- user authentication
- complex networks
- data encryption
- authentication scheme
- authentication mechanism
- network structure
- security requirements
- security mechanisms
- security analysis
- network traffic
- authentication protocol
- wireless sensor networks
- single point of failure
- security services
- identity management
- peer to peer
- application level
- trust relationships
- network management
- neural network
- factor authentication