Login / Signup
An Efficient Authentication Scheme for Internet of Things.
Jaafer Saraireh
Haya Joudeh
Published in:
Int. J. Commun. Networks Inf. Secur. (2021)
Keyphrases
</>
authentication scheme
smart card
user authentication
secret key
public key
image encryption
security flaws
security analysis
authentication protocol
image authentication
key management
real time
distributed systems
tampering detection