Login / Signup
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment.
Basudeb Bera
Anusha Vangala
Ashok Kumar Das
Pascal Lorenz
Muhammad Khurram Khan
Published in:
Comput. Stand. Interfaces (2022)
Keyphrases
</>
authentication scheme
user authentication
smart card
data mining
security analysis
image authentication
real time
access control
cloud computing
privacy preserving
image encryption
security flaws
resource constraints
secret key
key management