您当前的位置:
首页 >
文章列表页 >
Two-factor wearable device authentication protocol based on PUF and IPI
Papers | 更新时间:2024-06-05
    • Two-factor wearable device authentication protocol based on PUF and IPI

    • Journal on Communications   Vol. 38, Issue 6, Pages: 127-135(2017)
    • DOI:10.11959/j.issn.1000-436x.2017125    

      CLC: TP309.2
    • Online First:2017-06

      Published:25 June 2017

    移动端阅览

  • Jun WANG, Shu-bo LIU, Cai LIANG, et al. Two-factor wearable device authentication protocol based on PUF and IPI[J]. Journal on Communications, 2017, 38(6): 127-135. DOI: 10.11959/j.issn.1000-436x.2017125.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

2081

下载量

3

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Lightweight authentication key agreement protocol for Internet of vehicles
Enhanced Beidou user equipment access authentication protocol based on location key
Lightweight authentication protocol for RFID
Provable secure mutual authentication protocol for RFID in the standard model
Secure access authentication scheme for 4G wireless network based on PCL

Related Author

ZHOU Yi
WANG Pengchao
CHEN Dongdong
PANG Xiaohui
LIU Yali
Qiuyu BU
Jin CAO
Yuanyuan YANG

Related Institution

School of Cyber Science and Engineering, Southeast University
Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology
State Key Laboratory for Novel Software Technology, Nanjing University
College of Computer Science and Technology, Jiangsu Normal University
College of Engineering, Qatar University, Doha
0