Login / Signup
Cryptanalysis of an Authentication Scheme for WSN within an IoT Environment.
Aarti Goel
Devender Kumar
Deepak Kumar Sharma
Published in:
IC3 (2023)
Keyphrases
</>
authentication scheme
secret key
key management
wireless sensor networks
smart card
real time
image encryption
user authentication
public key
image authentication
resource constrained