Login / Signup
An Improved Authentication Scheme for BLE Devices with no I/O Capabilities.
Chandranshu Gupta
Gaurav Varshney
Published in:
CoRR (2022)
Keyphrases
</>
authentication scheme
smart card
user authentication
secret key
image encryption
security flaws
public key
security analysis
image authentication
data management
authentication protocol