A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication.
Manasha SaqibAyaz Hassan MoonPublished in: Comput. Secur. (2023)
Keyphrases
- security requirements
- security mechanisms
- security analysis
- data encryption
- authentication mechanism
- identity authentication
- identity management
- user authentication
- encryption decryption
- authentication protocol
- security issues
- security policies
- high security
- context aware
- fuzzy vault
- biometric template
- mobile devices
- public key cryptography
- authentication scheme
- security systems
- security model
- security protocols
- risk assessment