Hybrid PLS-ML Authentication Scheme for V2I Communication Networks.
Hala AminJawaher KaldariNora MohamedWaqas AmanSaif Al-KuwariPublished in: ISNCC (2023)
Keyphrases
- communication networks
- authentication scheme
- smart card
- wireless communication
- maximum likelihood
- secret key
- user authentication
- computer networks
- distributed databases
- security flaws
- network structure
- public key
- security analysis
- authentication protocol
- security requirements
- resource constrained
- data management
- face recognition
- real time