Secure authentication scheme for IoT and cloud servers.
Sheetal KalraSandeep K. SoodPublished in: Pervasive Mob. Comput. (2015)
Keyphrases
- authentication scheme
- cloud computing
- data center
- user authentication
- smart card
- secret key
- image encryption
- key management
- security flaws
- public key
- authentication protocol
- data management
- security analysis
- image authentication
- mutual authentication
- elliptic curve cryptography
- digital signature
- security issues
- key agreement
- energy consumption
- password guessing