The concept of authentication in WSNs using TPM
Saved in:
| Main Authors: | Janusz Furtak, Jan Chudzikiewicz |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Polish Information Processing Society
2014-09-01
|
| Series: | Annals of computer science and information systems |
| Online Access: | https://annals-csis.org/Volume_2/pliks/176.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Securing transmissions between nodes of WSN using TPM
by: Janusz Furtak, et al.
Published: (2015-10-01) -
Mutual authentication scheme based on the TPM cloud computing platform
by: Zhen-peng LIU, et al.
Published: (2012-11-01) -
Secure and Efficient Authentication Scheme for Mobile Sink in WSNs Based on Bilinear Pairings
by: Junsong Zhang, et al.
Published: (2014-02-01) -
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs
by: T. Sudhakar, et al.
Published: (2025-03-01) -
Using AHP to improve manufacturing processes in TPM on industrial and port complex
by: Fagner José Coutinho de Melo, et al.
Published: (2021-07-01)