Comments on the authentication scheme for IoT and cloud servers.
Ting-Fang ChengPublished in: ICCE-TW (2016)
Keyphrases
- authentication scheme
- cloud computing
- data center
- smart card
- image encryption
- secret key
- user authentication
- key management
- big data
- data management
- security flaws
- security analysis
- image authentication
- public key
- authentication protocol
- databases
- security issues
- distributed environment
- lightweight
- data points
- real time