In the YPAP, lightweight cryptographic operators are applied to realize authentication between a smart phone and two wearable devices, and yoking-proofs are ...
In this work, a yoking-proofs based authentication protocol (YPAP) is proposed for the wearable devices during secure wireless communications. In the YPAP,.
In the YPAP, lightweight cryptographic operators are applied to realize authentication between a smart phone and two wearable devices, and yoking-proofs are ...
In the YPAP, a physical unclonable function and lightweight cryptographic operators are jointly applied to realize mutual authentication between a smart phone ...
In this work, a yoking-proof-based authentication protocol (YPAP) is proposed for cloud-assisted wearable devices and Rubin logic-based security formal ...
The proposed protocol establishes yoking-proofs to integrate two wearable devices' main parameters, and achieve security properties of data confidentiality and ...
Missing: YPAP: | Show results with:YPAP:
In the YPAP, a physical unclonable function and lightweight cryptographic operators are jointly applied to realize mutual authentication between a smart phone ...
Along with the development of IoT applications, wearable devices are becoming popular for monitoring user data to provide intelligent service support.
People also ask
Which protocol is used for authentication of wireless devices?
What is authentication for wearable device?
Wan, Ypap: the yoking-proofs based authentication protocol for wearable devices in wireless communications, UIC-ATC-ScalCom-CBDCom-IoP (2015) 1639-1643.
It uses a “Physical Unclonable Function (PUF)” and lightweight cryptography operations to achieve mutual authentication between smartphones and wearable devices ...