Login / Signup

Towards a Blockgraph-Based Trustless Authentication Scheme for Future 6G Technology.

David A. Cordova MoralesThi Mai Trang NguyenGuy Pujolle
Published in: 6GNet (2023)
Keyphrases
  • authentication scheme
  • smart card
  • image encryption
  • user authentication
  • secret key
  • public key
  • security flaws
  • security analysis
  • authentication protocol
  • response time
  • low cost
  • security issues