Login / Signup

An Efficient Authentication Scheme for Internet of Things.

Ja'afer Al-SarairehHaya Joudeh
Published in: Int. J. Commun. Networks Inf. Secur. (2021)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • image encryption
  • secret key
  • public key
  • security flaws
  • security analysis
  • image authentication
  • high dimensional
  • end to end
  • authentication protocol