Sign in

Cryptanalysis of an Authentication Scheme for WSN within an IoT Environment.

Aarti GoelDevender KumarDeepak Kumar Sharma
Published in: IC3 (2023)
Keyphrases
  • authentication scheme
  • secret key
  • key management
  • wireless sensor networks
  • smart card
  • real time
  • image encryption
  • user authentication
  • public key
  • image authentication
  • resource constrained