Secure authentication scheme in 6G-enabled mobile Internet of things for online English education.
Jiming YinJie CuiPublished in: IET Networks (2022)
Keyphrases
- authentication scheme
- mobile devices
- mobile learning
- smart card
- user authentication
- secret key
- image encryption
- security flaws
- authentication protocol
- mobile computing
- mobile technologies
- online learning
- security analysis
- language learning
- public key
- image authentication
- elliptic curve cryptography
- mutual authentication
- key management
- higher education
- real time
- similarity measure