Login / Signup
Zero-Touch Mutual Authentication Scheme for 6TiSCH Industrial IoT Networks.
Ali Haj Hassan
Youcef Imine
Antoine Gallais
Bruno Quoitin
Published in:
IWCMC (2022)
Keyphrases
</>
authentication scheme
smart card
secret key
image encryption
user authentication
key management
image authentication
public key
cloud computing
authentication protocol
security flaws
computer networks
security analysis
anomaly detection