Authentication protocol built from a chaotic cryptosystem for a fog and cloud-based CWD-WPT charging station.
Luis Fernando Arias RomanPaulo Roberto de Lira GondimPublished in: IWCMC (2021)
Keyphrases
- authentication protocol
- chaotic maps
- image encryption
- security analysis
- cellular automata
- smart card
- key distribution
- authentication scheme
- image encryption scheme
- public key
- lightweight
- encryption algorithm
- image encryption algorithm
- secret key
- security protocols
- wavelet packet transform
- chaotic sequence
- user authentication
- rfid tags
- elliptic curve
- hash functions
- private key
- cloud computing
- rfid systems
- data management