Identity-Based Authentication Technique for IoT Devices.
Brij B. GuptaAkshat GauravKwok Tai ChuiChing-Hsien HsuPublished in: ICCE (2022)
Keyphrases
- key management
- key distribution
- identity based cryptography
- authentication and key agreement
- mobile devices
- management system
- smart objects
- authentication scheme
- biometric authentication
- signature scheme
- fragile watermarking
- security services
- wireless sensor networks
- cloud computing
- public key cryptography
- secure communication
- embedded systems
- mobile applications
- user authentication
- identity management
- security analysis
- image authentication
- signcryption scheme
- data encryption
- fault tolerant
- authentication protocol