Login / Signup
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT.
Bidisha Goswami
Hiten Choudhury
Published in:
J. Netw. Syst. Manag. (2022)
Keyphrases
</>
authentication scheme
smart card
key management
image encryption
user authentication
secret key
management system
security flaws
public key
image authentication
security analysis
authentication protocol
real time
high dimensional
lightweight
wireless sensor networks
high resolution
data analysis
similarity measure