×
In the YPAP, lightweight cryptographic operators are applied to realize authentication between a smart phone and two wearable devices, and yoking-proofs are ...
In this work, a yoking-proofs based authentication protocol (YPAP) is proposed for the wearable devices during secure wireless communications. In the YPAP,.
In the YPAP, lightweight cryptographic operators are applied to realize authentication between a smart phone and two wearable devices, and yoking-proofs are ...
In the YPAP, a physical unclonable function and lightweight cryptographic operators are jointly applied to realize mutual authentication between a smart phone ...
In this work, a yoking-proof-based authentication protocol (YPAP) is proposed for cloud-assisted wearable devices and Rubin logic-based security formal ...
The proposed protocol establishes yoking-proofs to integrate two wearable devices' main parameters, and achieve security properties of data confidentiality and ...
Missing: YPAP: | Show results with:YPAP:
In the YPAP, a physical unclonable function and lightweight cryptographic operators are jointly applied to realize mutual authentication between a smart phone ...
Along with the development of IoT applications, wearable devices are becoming popular for monitoring user data to provide intelligent service support.
People also ask
Wan, Ypap: the yoking-proofs based authentication protocol for wearable devices in wireless communications, UIC-ATC-ScalCom-CBDCom-IoP (2015) 1639-1643.
It uses a “Physical Unclonable Function (PUF)” and lightweight cryptography operations to achieve mutual authentication between smartphones and wearable devices ...