Login / Signup
Cryptanalysis and improvement of an authentication scheme for IoT.
Rahul Kumar
Mridul Kumar Gupta
Saru Kumari
Published in:
Int. J. Inf. Comput. Secur. (2022)
Keyphrases
</>
authentication scheme
secret key
key management
smart card
image encryption
security flaws
public key
image authentication
user authentication
hash functions
sensor networks
digital images
cloud computing
security analysis
tampering detection