Login / Signup
A trusted authentication scheme based on super SIM card for mobile office for industry 4.0.
Lingnan Kong
Zhendong Qian
Lvbin Xu
Jun Yang
Quanyuan Shao
Published in:
Neural Comput. Appl. (2023)
Keyphrases
</>
authentication scheme
smart card
secret key
image encryption
user authentication
authentication protocol
mobile devices
image authentication
security analysis
information security
point of sale
security flaws
security requirements
low cost
public key
real time
security mechanisms
cost effective
cloud computing
knn