Login / Signup
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy.
Shengke Zeng
Yi Mu
Hongjie Zhang
Mingxing He
Published in:
Inf. Sci. (2020)
Keyphrases
</>
authentication protocol
wifi
smart card
lightweight
end to end
security protocols
rfid tags
real time
user interface
wireless networks
resource constrained
security mechanisms