Anonymous authentication scheme for smart home environment with provable security.
Mengxia ShuaiNenghai YuHongxia WangLing XiongPublished in: Comput. Secur. (2019)
Keyphrases
- authentication scheme
- smart home environment
- user authentication
- smart home
- security flaws
- surveillance system
- smart card
- authentication protocol
- activity recognition
- security analysis
- secret key
- key management
- public key
- home environments
- security requirements
- access control
- security policies
- information security
- feature space
- security mechanisms
- biometric systems
- network security
- user activities
- software engineering