Login / Signup
Secure and anonymous authentication scheme for the Internet of Things with pairing.
Hsiao-Ling Wu
Chin-Chen Chang
Long-Sheng Chen
Published in:
Pervasive Mob. Comput. (2020)
Keyphrases
</>
authentication scheme
smart card
user authentication
image encryption
public key
secret key
authentication protocol
security flaws
elliptic curve cryptography
image authentication
security analysis
digital signature scheme
key management
mutual authentication
web services
rfid technology