Login / Signup
TRUTH: Trust and Authentication Scheme in 5G-IIoT.
Seyed Ahmad Soleymani
Shidrokh Goudarzi
Mohammad Hossein Anisi
Haitham S. Cruickshank
Anish Jindal
Nazri Kama
Published in:
IEEE Trans. Ind. Informatics (2023)
Keyphrases
</>
authentication scheme
smart card
image encryption
user authentication
secret key
security flaws
public key
image authentication
security analysis
information systems
real time
key management
authentication protocol