Login / Signup
A Survey on Authentication Schemes in IoT.
Kumar Sekhar Roy
Hemanta Kumar Kalita
Published in:
ICIT (2017)
Keyphrases
</>
management system
big data
user authentication
authentication scheme
key agreement
information systems
identity authentication
low cost
cloud computing
biometric authentication
graphical password
integrity verification