UDhashing : physical unclonable function-based user-device hash for endpoint authentication
With IT consumerization, access control to remote system by endpoint user and endpoint device is mandatory for security and privacy protection. Existing systems bind an end-user with his/her registered devices but authenticate only the user and device independently. This work presents a novel UDhash...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/145813 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Be the first to leave a comment!