2015 IEEE Global Communications Conference (GLOBECOM) 2014
DOI: 10.1109/glocom.2014.7417597
|View full text |Cite
|
Sign up to set email alerts
|

An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
2

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 11 publications
0
4
0
2
Order By: Relevance
“…Initially, "Foren6" will be introduced as a root customer. If some other user account is used, then the user should be granted permission to use USB storage [21,22].…”
Section: Fig 3 Cooja Implementation Analyticsmentioning
confidence: 99%
“…Initially, "Foren6" will be introduced as a root customer. If some other user account is used, then the user should be granted permission to use USB storage [21,22].…”
Section: Fig 3 Cooja Implementation Analyticsmentioning
confidence: 99%
“…Key-based authentication techniques [24], [25] belong to the category of authentication techniques based on something you have. Unlike passwords that require the authenticatee (an entity that is to be authenticated) to transmit the authentication data, key-based authentication schemes allow authentication based on the solution to a complex mathematical problem [26].…”
Section: B Key-based Authenticationmentioning
confidence: 99%
“…Também há iniciativas que abordam soluções para ambientes IoT específicos, como casas inteligentes [Hong et al 2016] ou aplicações para assistência técnica de equipamentos [Witkovski et al 2015]. FLAT, no entanto, tem como objetivo ser mais abrangente, podendo ser utilizado nos mais diversos ambientes IoT.…”
Section: Trabalhos Relacionadosunclassified