Login / Signup
A CPK-Based Identity Authentication Scheme for IoT.
Mingming Zhang
Jiaming Mao
Yuanyuan Ma
Liangjie Xu
Chuanjun Wang
Ran Zhao
Zhihao Li
Lu Chen
Wenbing Zhao
Published in:
Comput. Syst. Sci. Eng. (2022)
Keyphrases
</>
authentication scheme
public key
smart card
secret key
key management
image encryption
user authentication
security analysis
mutual authentication
authentication protocol
security flaws
image authentication
cloud computing