Login / Signup
A Fast and Scalable Authentication Scheme in IoT for Smart Living.
Jianhua Li
Jiong Jin
Lingjuan Lyu
Dong Yuan
Yingying Yang
Longxiang Gao
Chao Shen
Published in:
CoRR (2020)
Keyphrases
</>
authentication scheme
smart card
user authentication
secret key
image encryption
smart objects
smart home
key management
management system
authentication protocol
security flaws
cloud computing
public key
security analysis
database systems
face recognition