Hardware based Two-Factor User Authentication for the Internet of Things.
Mehdi Akbari GurabiOmar AlfandiArne BochemDieter HogrefePublished in: IWCMC (2018)
Keyphrases
- user authentication
- authentication scheme
- security analysis
- biometric authentication
- real time
- low cost
- keystroke dynamics
- remote user authentication scheme
- image processing
- biometric systems
- authentication protocol
- information security
- computer systems
- embedded systems
- software engineering
- similarity measure
- data mining