Practical and Secure IoT Device Authentication Using Physical Unclonable Functions.
John Ross WallrabensteinPublished in: FiCloud (2016)
Keyphrases
- user authentication
- authentication scheme
- authentication mechanism
- authentication protocol
- data encryption
- security mechanisms
- key distribution
- identity management
- real world
- security analysis
- integrity verification
- management system
- security requirements
- secure manner
- password authentication
- security services
- key management
- cloud computing
- public key cryptography
- identity authentication
- remote server
- rfid systems
- encryption decryption
- security protocols
- big data
- factor authentication