Login / Signup
A secure authentication scheme for Internet of Things.
King-Hang Wang
Chien-Ming Chen
Weicheng Fang
Tsu-Yang Wu
Published in:
Pervasive Mob. Comput. (2017)
Keyphrases
</>
authentication scheme
user authentication
smart card
image encryption
secret key
security flaws
authentication protocol
elliptic curve cryptography
public key
image authentication
security analysis
key management
mutual authentication
high dimensional
information security
tampering detection