News

Lawmakers in many states have changed the rules in recent decades to protect winners from being targeted by criminals and ...
In this paper, we present a novel lightweight anonymous user authentication protocol for the IoT environment by utilizing “cryptographic one-way hash function”, “physically unclonable function (PUF)” ...