Login / Signup

An Improved Authentication Scheme for BLE Devices with no I/O Capabilities.

Chandranshu GuptaGaurav Varshney
Published in: CoRR (2022)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • secret key
  • image encryption
  • security flaws
  • public key
  • security analysis
  • image authentication
  • data management
  • authentication protocol