Login / Signup
A secure three-factor authentication scheme for IoT environments.
AmirHossein Ghafouri Mirsaraei
Ali Barati
Hamid Barati
Published in:
J. Parallel Distributed Comput. (2022)
Keyphrases
</>
authentication scheme
user authentication
key management
smart card
secret key
image encryption
elliptic curve cryptography
security flaws
image authentication
authentication protocol
public key
lightweight
privacy preserving
information security