2016 14th Annual Conference on Privacy, Security and Trust (PST) 2016
DOI: 10.1109/pst.2016.7906957
|View full text |Cite
|
Sign up to set email alerts
|

Generation of one-time keys for single line authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…PUFs are used to give each device in the network a distinct identity and to provide authentication while sending data to the server. Hossain, S. et al [12] introduced a device authentication protocol for an IoMT device network that can strengthen system security and make the network impervious to such attacks. Regardless of the protocol used for communication between the end device and the server, this protocol can be used.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…PUFs are used to give each device in the network a distinct identity and to provide authentication while sending data to the server. Hossain, S. et al [12] introduced a device authentication protocol for an IoMT device network that can strengthen system security and make the network impervious to such attacks. Regardless of the protocol used for communication between the end device and the server, this protocol can be used.…”
Section: Related Workmentioning
confidence: 99%
“…Techniques for encryption and methods for encoding are employed to help prevent data or information leaks. In order to identify malicious users, suggested approaches and strategies have demonstrated significant detection rates and misleading alert rates [19].…”
Section: Related Workmentioning
confidence: 99%