Towards 5G-based IoT security analysis against Vo5G eavesdropping.
SungMoon KwonSeongmin ParkHyungJin ChoYoungkwon ParkDowon KimKangbin YimPublished in: Computing (2021)
Keyphrases
- security analysis
- management system
- security requirements
- smart card
- public key
- high security
- security properties
- user authentication
- cloud computing
- image encryption
- authentication protocol
- security model
- security problems
- encryption scheme
- proxy signature scheme
- encryption algorithm
- authentication scheme
- rfid systems
- access control policies
- multiresolution
- similarity measure