PUF-Based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment.
Jing LongWei LiangKuan-Ching LiDafang ZhangMingdong TangHaibo LuoPublished in: IEEE Access (2019)
Keyphrases
- computing environments
- authentication scheme
- electronic devices
- computing platform
- trusted computing
- embedded systems
- smart card
- secret key
- user authentication
- low cost
- public key
- real time
- security flaws
- mobile agents
- service discovery
- peer to peer
- pervasive computing environments
- grid computing
- computing systems
- computer systems
- mobile devices
- image processing
- pervasive computing
- security analysis
- mobile applications
- smart phones
- intelligent systems
- key management
- authentication protocol