Notes on "Secure authentication scheme for IoT and cloud servers".
Chin-Chen ChangHsiao-Ling WuChin-Yu SunPublished in: Pervasive Mob. Comput. (2017)
Keyphrases
- authentication scheme
- cloud computing
- data center
- user authentication
- key management
- image encryption
- smart card
- secret key
- public key
- security flaws
- image authentication
- authentication protocol
- mutual authentication
- elliptic curve cryptography
- security analysis
- data management
- energy consumption
- real time
- sensitive data