Security Implementation For Authentication In Iot Environments.
Ekkachan RattanalerdnusornPhithak ThaenkaewChalee VorakulpipatPublished in: ICCCS (2019)
Keyphrases
- security mechanisms
- security problems
- security requirements
- encryption decryption
- user authentication
- integrity verification
- authentication mechanism
- authentication protocol
- virtual private network
- management system
- information security
- security analysis
- key management
- identity authentication
- data encryption
- fuzzy vault
- authentication scheme
- security issues
- authentication systems
- access control
- security systems
- secret key
- identity management
- public key cryptography
- computing environments
- big data