An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things Against Perpetual Leakage
IEEE Trans Inf Forensics Secur(2025)
Key words
Privacy-preserving,password-based authentication,weak password collection,Internet of Things,secret sharing
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined