Login / Signup

A Two-Factor Authentication Scheme for Moving Connected Vehicles.

Dajiang SuoSanjay E. Sarma
Published in: VTC Fall (2022)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • secret key
  • image encryption
  • real time
  • security flaws
  • image authentication
  • public key
  • authentication protocol
  • moving objects
  • security analysis