Login / Signup
Anonymous chaotic-based identity authentication protocol in IoT.
Jing Long
Xin Su
Published in:
Int. J. Embed. Syst. (2021)
Keyphrases
</>
identity authentication
mobile commerce
management system
network security
key distribution
lightweight
cloud computing
key management
database
database systems
mobile devices
peer to peer
intrusion detection
ubiquitous computing
security protocols