Login / Signup

Design and deployment of a security protocol to provide authentication services for connected objects.

Wassim JerbiAbderrahmen GuermaziHafedh Trabelsi
Published in: EATIS (2020)
Keyphrases
  • security services
  • security protocols
  • context aware
  • authentication protocol
  • smart card
  • automated design
  • service providers
  • security requirements
  • security mechanisms