Login / Signup
Authentication scheme based on blockchain and Proof-of-Work for IoT.
Ines Adjeroud
Sarra Cherbal
Chahrazed Benrebbouh
Hamza Baaraoui
Published in:
PAIS (2024)
Keyphrases
</>
authentication scheme
smart card
image encryption
secret key
user authentication
key management
management system
security flaws
public key
cloud computing
security analysis
authentication protocol
image authentication
feature extraction
sensor networks
information security