Login / Signup

An efficient authentication scheme based on Zero Trust for UAV swarm.

Dongyu YangYue ZhaoKaijun WuXiaoyu GuoHaiyang Peng
Published in: NaNA (2021)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • image encryption
  • secret key
  • public key
  • trust model
  • image authentication
  • security flaws
  • real time
  • security analysis
  • data mining