Sign in

A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy.

Shengke ZengYi MuHongjie ZhangMingxing He
Published in: Inf. Sci. (2020)
Keyphrases
  • authentication protocol
  • wifi
  • smart card
  • lightweight
  • end to end
  • security protocols
  • rfid tags
  • real time
  • user interface
  • wireless networks
  • resource constrained
  • security mechanisms