Login / Signup

An efficient three-factor user authentication scheme for industrial wireless sensor network with fog computing.

Shreeya Swagatika SahooSujata MohantyBanshidhar Majhi
Published in: Int. J. Commun. Syst. (2022)
Keyphrases
  • authentication scheme
  • user authentication
  • wireless sensor networks
  • security analysis
  • smart card
  • public key
  • image encryption
  • anomaly detection
  • information security