Login / Signup
Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things.
Wenting Li
Haibo Cheng
Ping Wang
Published in:
Cyber Security (2019)
Keyphrases
</>
authentication scheme
data access
image encryption
real time
data management
smart card
user authentication
secret key
data sharing
database applications
public key
security analysis
authentication protocol
sql server
database management systems
information security
data objects
information systems