Jinchuan Lin

  • Citations Per Year
Learn More
Pervasive computing promises rich and seamless interaction with the surrounding computing environment. However, the ubiquitous environment presents a new security challenge. Authentication is a cornerstone of security. This paper proposes a secure authentication model based on Information Hiding and implements an approach for hiding and restoring the(More)
  • 1