Login / Signup
A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications.
Md Jubayer al Mahmod
Ujjwal Guin
Published in:
Cryptogr. (2020)
Keyphrases
</>
authentication scheme
low cost
user authentication
key management
secret key
smart card
image encryption
authentication protocol
public key
security analysis
security flaws
elliptic curve cryptography
security requirements
end to end
lightweight
image authentication
cloud computing
mutual authentication
peer to peer