Login / Signup
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments.
R. Vinoth
Lazarus Jegatha Deborah
Pandi Vijayakumar
Brij B. Gupta
Published in:
IEEE Trans. Netw. Sci. Eng. (2022)
Keyphrases
</>
authentication scheme
cloud computing
smart card
user authentication
secret key
image authentication
authentication protocol
security flaws
key management
elliptic curve cryptography
public key
security analysis
data management
peer to peer
mutual authentication