Automated Authentication Credential Derivation for the Secured Configuration of IoT Devices.
Thomas UlzThomas W. PieberChristian StegerAndrea HöllerSarah HaasRainer MatischekPublished in: SIES (2018)
Keyphrases
- management system
- mobile devices
- security analysis
- semi automated
- trust negotiation
- smart objects
- fully automated
- access control
- embedded systems
- mobile computing
- authentication scheme
- biometric authentication
- neural network
- hash functions
- smart phones
- lightweight
- authentication protocol
- user authentication
- mobile phone