Configurable Anonymous Authentication Schemes For The Internet of Things (IoT).
Amar RasheedRay R. HashemiAyman BagabasJeffrey YoungChanukya BadriKeyur PatelPublished in: RFID (2019)
Keyphrases
- big data
- smart objects
- management system
- ubiquitous computing
- mobile computing
- trusted platform module
- location information
- cloud computing
- physical world
- key agreement
- biometric data
- identity authentication
- electronic payment
- mobile devices
- peer to peer
- authentication protocol
- image authentication
- identity management
- open source