Security Analysis of a User Authentication Scheme for IoT-Based Healthcare.
Shengbao WangXin ZhouKang WenBosen WengPeng ZengPublished in: IEEE Internet Things J. (2023)
Keyphrases
- security analysis
- authentication scheme
- user authentication
- smart card
- public key
- authentication protocol
- image encryption
- high security
- elliptic curve cryptography
- security requirements
- security properties
- mutual authentication
- security model
- encryption scheme
- access control policies
- conflict resolution
- cloud computing
- secret key
- password guessing
- software architecture
- high dimensional data