Hybrid blockchain and pseudonymous authentication for secure and trusted IoT networks.
Jollen ChenPublished in: SIGBED Rev. (2018)
Keyphrases
- authentication mechanism
- user authentication
- security analysis
- identity management
- data encryption
- authentication protocol
- security mechanisms
- trust relationships
- trusted computing
- authentication scheme
- trusted platform module
- security requirements
- password authentication
- key distribution
- factor authentication
- cloud computing
- management system
- secure manner
- integrity verification
- public key cryptography
- secure multi party
- rights management
- key management
- secure communication
- biometric authentication
- security issues
- lightweight
- computer networks
- distributed environment
- smart card
- complex networks
- access control
- public key encryption
- mutual authentication
- rfid systems
- public key