Login / Signup
A secure authentication protocol for wearable devices environment using ECC.
Devender Kumar
Harmanpreet Singh Grover
Adarsh
Published in:
J. Inf. Secur. Appl. (2019)
Keyphrases
</>
authentication protocol
security analysis
wearable devices
smart card
public key
authentication scheme
lightweight
security protocols
security requirements
user authentication
password authentication
rfid tags
secret key
rfid systems
real time
mutual authentication
hash functions
human computer interaction