The yoking-proof-based authentication protocol for cloud-assisted wearable devices

W Liu, H Liu, Y Wan, H Kong, H Ning - Personal and Ubiquitous …, 2016 - Springer
Along with the development of IoT applications, wearable devices are becoming popular for
monitoring user data to provide intelligent service support. The wearable devices confront …

The yoking-proof-based authentication protocol for cloud-assisted wearable devices.

W Liu, H Liu, Y Wan, H Kong… - Personal & Ubiquitous …, 2016 - search.ebscohost.com
Along with the development of IoT applications, wearable devices are becoming popular for
monitoring user data to provide intelligent service support. The wearable devices confront …

The yoking-proof-based authentication protocol for cloud-assisted wearable devices

W Liu, H Liu, Y Wan, H Kong, H Ning - Personal and Ubiquitous …, 2016 - dl.acm.org
Along with the development of IoT applications, wearable devices are becoming popular for
monitoring user data to provide intelligent service support. The wearable devices confront …

The yoking-proof-based authentication protocol for cloud-assisted wearable devices

W Liu, H Liu, Y Wan, H Kong, H Ning - Personal and Ubiquitous …, 2016 - infona.pl
Along with the development of IoT applications, wearable devices are becoming popular for
monitoring user data to provide intelligent service support. The wearable devices confront …

The yoking-proof-based authentication protocol for cloud-assisted wearable devices

W Liu, H Liu, Y Wan, H Kong… - Personal and Ubiquitous …, 2016 - search.proquest.com
Along with the development of IoT applications, wearable devices are becoming popular for
monitoring user data to provide intelligent service support. The wearable devices confront …

[引用][C] The yoking-proof-based authentication protocol for cloud-assisted wearable devices

W Liu, H Liu, Y Wan, H Kong, H Ning - Personal and ubiquitous computing, 2016 - Springer