Login / Signup
An efficient three-factor user authentication scheme for industrial wireless sensor network with fog computing.
Shreeya Swagatika Sahoo
Sujata Mohanty
Banshidhar Majhi
Published in:
Int. J. Commun. Syst. (2022)
Keyphrases
</>
authentication scheme
user authentication
wireless sensor networks
security analysis
smart card
public key
image encryption
anomaly detection
information security