2020
DOI: 10.1007/s11276-020-02319-x
|View full text |Cite
|
Sign up to set email alerts
|

An anonymous and secure key agreement protocol for NFC applications using pseudonym

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…This integration heralds a future where privacy and service quality can coexist harmoniously. The following case studies serve as illustrations [84]:…”
Section: B Service Selection-based Approachmentioning
confidence: 99%
“…This integration heralds a future where privacy and service quality can coexist harmoniously. The following case studies serve as illustrations [84]:…”
Section: B Service Selection-based Approachmentioning
confidence: 99%
“…Pseudonyms are temporary identities that have been assigned to the client prior by the Trusted Third Party (TTP). We refer readers to [16] to study the pseudonym architecture that we are using in this paper. Upon receiving the answer from the server, the client presents his biometric to the input sensor (num 2) and the extracted feature will be transformed to a cancelable biometric template (num 3) using the current AD (num 4) that he has stored on his device/smartcard from the enrolment process.…”
Section: Proposed Scheme: Otb-morphmentioning
confidence: 99%