Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Nov 9, 2020 · The scheme is highly efficient as it is built of only symmetric key based operations, but requires user interaction via the usage of a mobile ...
People also ask
Therefore, this paper proposes a physical unclonable function (PUF) based mutual authentication scheme, being the first security scheme for a fog architecture, ...
Lightweight PUF based authentication scheme for fog architecture. Language ... Therefore, this paper proposes a physical unclonable function (PUF) based mutual ...
The proposed scheme uses lightweight cryptographic operations, including the one-way cryptographic hash function and the Barrel Shifter Physically Unclonable ...
Therefore, this paper proposes a physical unclonable function (PUF) based mutual authentication scheme, being the first security scheme for a fog architecture, ...
Therefore, this paper proposes a physical unclonable function (PUF) based mutual authentication scheme, being the first security scheme for a fog architecture, ...
This paper proposes a new resource-efficient physical unclonable function (PUF) based authentication scheme to protect the security and privacy of the ...
To address above problems, this paper proposes a light-weight secure authentication scheme for fog-enabled smart home systems. The scheme uses PUF to achieve ...
Fog computing in healthcare internet of things: A case study on ECG feature extraction, In IEEE International Conference on Computer and Information Technology; ...
Dive into the research topics of 'Lightweight PUF based authentication scheme for fog architecture'. Together they form a unique fingerprint. Sort by; Weight ...