Search
for Author
All Reviews
Kong, Huafeng
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
1
of
1
reviews
The yoking-proof-based authentication protocol for cloud-assisted wearable devices
Liu W., Liu H., Wan Y., Kong H., Ning H. Personal and Ubiquitous Computing 20(3): 469-479, 2016. Type: Article
To understand the problem raised in the paper, we have to clarify two important concepts included in its title. One of the concepts is yoking-proof-based authentication. The idea of a yoking-proof protocol for radio-frequency identific...
...
Aug 16 2016
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy