Articles with "deniable authentication" as a keyword



Photo by szolkin from unsplash

Practical deniable authentication for pervasive computing environments

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Networks"

DOI: 10.1007/s11276-016-1317-9

Abstract: AbstractPervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two… read more here.

Keywords: computing environments; pervasive computing; practical deniable; deniable authentication ... See more keywords