Secure user authentication scheme for the Virtual Doctor System enabled H-IoT through 5G Network: A comparison study.
Fatima RougaiiTomader MazriPublished in: NISS (ACM) (2021)
Keyphrases
- authentication scheme
- user authentication
- smart card
- key management
- image encryption
- security analysis
- security flaws
- authentication protocol
- secret key
- wireless sensor networks
- elliptic curve cryptography
- public key
- image authentication
- computer networks
- information security
- cloud computing
- location information
- network traffic