Login / Signup
An anonymous two-factor authentication protocol for IoT-based applications.
Mohammad Javad Sadri
Maryam Rajabzadeh Asaar
Published in:
Comput. Networks (2021)
Keyphrases
</>
authentication protocol
smart card
rfid systems
security analysis
lightweight
rfid tags
public key
security protocols
password authentication
hash functions
secret key
key management
peer to peer
authentication mechanism
cloud computing
low cost
similarity measure