Proposing secure and lightweight authentication scheme for IoT based E-health applications.
Maria AlmulhimNoor ZamanPublished in: ICACT (2018)
Keyphrases
- lightweight
- authentication scheme
- authentication protocol
- key management
- user authentication
- smart card
- image encryption
- public key
- secret key
- rfid tags
- rfid systems
- wireless sensor networks
- image authentication
- security analysis
- cloud computing
- key distribution
- security flaws
- cryptographic protocols
- resource constrained
- information security