Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy.
Doo-Hee HwangJin-Myeong ShinYoon-Ho ChoiPublished in: ICUFN (2018)
Keyphrases
- wearable devices
- authentication protocol
- trusted third party
- smart card
- security analysis
- user authentication
- lightweight
- public key
- authentication scheme
- gaze tracking
- rfid tags
- security protocols
- password authentication
- key distribution
- secret key
- hash functions
- security requirements
- authentication mechanism
- rfid systems
- information security