Sign in

A community-based hierarchical user authentication scheme for Industry 4.0.

Akash SinhaGulshan ShrivastavaPrabhat KumarDeepak Gupta
Published in: Softw. Pract. Exp. (2022)
Keyphrases
  • authentication scheme
  • user authentication
  • smart card
  • public key
  • secret key
  • security analysis
  • authentication protocol
  • image encryption
  • data streams
  • security requirements
  • image authentication