2022
DOI: 10.1109/jiot.2021.3121350
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 44 publications
0
5
0
Order By: Relevance
“…Our survey assumes that data sharing in smart home systems is governed by access control. 1 Under this assumption, sharing data with someone is equivalent to granting them access to that data. Therefore, we consider sharing principles as contextual factors that can be built into access control components of a smart home system.…”
Section: Sharing Principlesmentioning
confidence: 99%
“…Our survey assumes that data sharing in smart home systems is governed by access control. 1 Under this assumption, sharing data with someone is equivalent to granting them access to that data. Therefore, we consider sharing principles as contextual factors that can be built into access control components of a smart home system.…”
Section: Sharing Principlesmentioning
confidence: 99%
“…Biometric information is the best way to authenticate and verify users [ 16 , 17 , 18 ]. In 2004, Dodis et al [ 19 ] proposed the Fuzzy Extractor to obtain a unique bit string extracted from the biometric template.…”
Section: Preliminariesmentioning
confidence: 99%
“…Elliptic curve cryptography can be realized through software [ 10 ] and hardware [ 11 ] approaches. Software-based ECC offers low design costs and high portability, but it is constrained by processor performance and lower efficiency, rendering it unsuitable for high-performance IoT applications.…”
Section: Introductionmentioning
confidence: 99%