An Efficient and Secure Authentication Protocol with Deep Learning Based Key Generation toward Securing Healthcare Data in IoT.

Sudhir SharmaSandesh TripathiKaushal Kishor BhattNitin Chhimwal
Published in: Cybern. Syst. (2024)
Keyphrases
  • data sets
  • data analysis
  • deep learning
  • rfid tags
  • information systems
  • training data
  • similarity measure
  • object detection
  • data management
  • cloud computing
  • intrusion detection
  • data distribution
  • authentication protocol