Login / Signup
An improved authentication scheme for BLE devices with no I/O capabilities.
Chandranshu Gupta
Gaurav Varshney
Published in:
Comput. Commun. (2023)
Keyphrases
</>
authentication scheme
smart card
user authentication
secret key
image encryption
public key
image authentication
security flaws
power consumption
key management
security analysis