Login / Signup
A broadcast authentication scheme in IoT environments.
Bacem Mbarek
Aref Meddeb
Wafa Ben Jaballah
Mohamed Mosbah
Published in:
AICCSA (2016)
Keyphrases
</>
authentication scheme
smart card
user authentication
image encryption
secret key
key management
image authentication
security flaws
public key
cloud computing
security analysis
query processing
wireless sensor networks
sensor networks
authentication protocol