Login / Signup
A dynamic anonymous authentication scheme with trusted fog computing in V2G networks.
Wenhua Huang
Hongyuan Du
JingYu Feng
Gang Han
Wenbo Zhang
Published in:
J. Inf. Secur. Appl. (2023)
Keyphrases
</>
authentication scheme
smart card
user authentication
image encryption
secret key
security flaws
security analysis
authentication protocol
image authentication