Login / Signup
An Efficient Authentication Scheme for Internet of Things.
Ja'afer Al-Saraireh
Haya Joudeh
Published in:
Int. J. Commun. Networks Inf. Secur. (2021)
Keyphrases
</>
authentication scheme
smart card
user authentication
image encryption
secret key
public key
security flaws
security analysis
image authentication
high dimensional
end to end
authentication protocol