Login / Signup
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.
Mian Ahmad Jan
Priyadarsi Nanda
Xiangjian He
Zhiyuan Tan
Ren Ping Liu
Published in:
TrustCom (2014)
Keyphrases
</>
authentication scheme
smart card
physical world
real time
image authentication
user authentication
secret key
ubiquitous computing
mobile devices
high resolution
public key