Secure IoT Device Authentication Scheme using Key Hiding Technology.
Byoung-Koo KimSeoungyong YoonYousung KangDooho ChoiPublished in: ICTC (2020)
Keyphrases
- authentication scheme
- secret key
- smart card
- user authentication
- key management
- secure communication
- image encryption
- authentication protocol
- security flaws
- public key
- security analysis
- high security
- cost effective
- image authentication
- elliptic curve cryptography
- private key
- information systems
- password guessing
- resource constrained
- cloud computing