Highly Efficient Anonymous IoT Authentication using Composite Hashing.
Hung-Yu ChienPublished in: DSC (2021)
Keyphrases
- highly efficient
- gray code
- trusted platform module
- management system
- low cost
- biometric authentication
- low latency
- data structure
- cloud computing
- trusted computing
- low complexity
- hash functions
- user authentication
- nearest neighbor search
- similarity search
- peer to peer
- electronic payment
- security mechanisms
- hamming distance
- real time
- big data
- information retrieval