Secure and low-power authentication for resource-constrained devices | IEEE Conference Publication | IEEE Xplore