News
Lawmakers in many states have changed the rules in recent decades to protect winners from being targeted by criminals and ...
In this paper, we present a novel lightweight anonymous user authentication protocol for the IoT environment by utilizing “cryptographic one-way hash function”, “physically unclonable function (PUF)” ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results