Login / Signup
An Efficient and Secure Authentication Protocol with Deep Learning Based Key Generation toward Securing Healthcare Data in IoT.
Sudhir Sharma
Sandesh Tripathi
Kaushal Kishor Bhatt
Nitin Chhimwal
Published in:
Cybern. Syst. (2024)
Keyphrases
</>
data sets
data analysis
deep learning
rfid tags
information systems
training data
similarity measure
object detection
data management
cloud computing
intrusion detection
data distribution
authentication protocol