Cargando…

Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things

Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design practical and secure authentication and key agreement protocols. Considering the weak computational power of sensors, many scholars have des...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhao, Xingwen, Li, Dexin, Li, Hui
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9572988/
https://www.ncbi.nlm.nih.gov/pubmed/36236609
http://dx.doi.org/10.3390/s22197510