An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things against Perpetual Leakage
C Jiang, C Xu, X Dong, K Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Password-based authentication is widely applied in Internet of Things (IoT). It allows IoT
devices to identify users with passwords to resist unauthorized access. However, choices of …
devices to identify users with passwords to resist unauthorized access. However, choices of …
Password-Based Authenticated Key Exchange for Cloud Storage from RLWE
G **e, C Xu, C Jiang, Y Han, X Dong - Proceedings of the 2024 2nd …, 2024 - dl.acm.org
Cloud storage enables users to store, retrieve, and share large amounts of data in a flexible
and convenient way. To guarantee only authorized users can access the data, authenticated …
and convenient way. To guarantee only authorized users can access the data, authenticated …