Login / Signup

An improved authentication scheme for BLE devices with no I/O capabilities.

Chandranshu GuptaGaurav Varshney
Published in: Comput. Commun. (2023)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • secret key
  • image encryption
  • public key
  • image authentication
  • security flaws
  • power consumption
  • key management
  • security analysis