Login / Signup
A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications.
Fei Chen
Zixing Xiao
Tao Xiang
Junfeng Fan
Hong Linh Truong
Published in:
IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
</>
authentication scheme
smart card
user authentication
security flaws
key management
smart objects
secret key
image authentication
image encryption
management system
public key
authentication protocol
information systems
access control
security analysis