Login / Signup
PUF based IoT Device Authentication Scheme.
Byoung-Koo Kim
Seoungyong Yoon
Yousung Kang
Dooho Choi
Published in:
ICTC (2019)
Keyphrases
</>
authentication scheme
electronic devices
smart card
key management
image encryption
user authentication
secret key
image authentication
public key
security flaws
authentication protocol
security analysis
cloud computing
low cost
region of interest
intrusion detection
image compression
data analysis