Login / Signup
A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection.
Zigang Chen
Jin Ao
Wenjun Luo
Zhiquan Cheng
Yuhong Liu
Kai Sheng
Long Chen
Published in:
J. Inf. Secur. Appl. (2022)
Keyphrases
</>
authentication scheme
peer to peer
smart card
information systems
access control
computer networks
public key
security analysis
user authentication
data mining
database systems
digital libraries
query processing
low cost
data management
image encryption