Login / Signup
Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function.
Bahaa Hussein Taher
Lu Hong Wei
Ali A. Yassin
Published in:
CSAI/ICIMT (2018)
Keyphrases
</>
hash functions
provably secure
hashing algorithm
cloud computing
similarity search
authentication protocol
lightweight
hamming distance
management system
chaotic map
database
authentication scheme
key distribution
secret key
standard model
key management
signature scheme
feature selection