Login / Signup
Novel one round message authentication scheme for constrained IoT devices.
Hassan N. Noura
Ola Salman
Raphaël Couturier
Ali Chehab
Published in:
J. Ambient Intell. Humaniz. Comput. (2022)
Keyphrases
</>
authentication scheme
smart card
image encryption
user authentication
secret key
key management
mobile devices
image authentication
public key
least significant bit
smart objects
security flaws
cloud computing
security analysis
authentication protocol