In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
CITATION STYLE
Køien, G. M. (2012). Privacy enhanced device access. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 94 LNICST, pp. 76–87). https://doi.org/10.1007/978-3-642-30244-2_7
Mendeley helps you to discover research relevant for your work.