Login / Signup
An Efficient Physically Unclonable Function based Authentication Scheme for V2G Network.
Giriraj Sharma
Amit Mahesh Joshi
Saraju P. Mohanty
Published in:
iSES (2021)
Keyphrases
</>
authentication scheme
public key
secret key
smart card
computer networks
wireless sensor networks
user authentication
peer to peer
image encryption
high dimensional
digital images
operating system
authentication protocol
security flaws