Login / Signup
Design and deployment of a security protocol to provide authentication services for connected objects.
Wassim Jerbi
Abderrahmen Guermazi
Hafedh Trabelsi
Published in:
EATIS (2020)
Keyphrases
</>
security services
security protocols
context aware
authentication protocol
smart card
automated design
service providers
security requirements
security mechanisms