Keyphrases
Internet of Things
100%
Remote User Authentication
100%
6LoWPAN
100%
User Authentication Scheme
100%
Limited Resources
44%
Security Privacy
33%
User Needs
22%
Remote User
22%
Network Node
22%
Time-varying Data
11%
Resilient
11%
Computational Cost
11%
Security Analysis
11%
Wireless Networks
11%
Malicious Attacks
11%
Internet of Things Devices
11%
Internet of Things Applications
11%
Communication Overhead
11%
Internet of Things Networks
11%
Internet Protocol Version 6 (IPv6)
11%
Random Oracle Model
11%
Formal Security Analysis
11%
Symmetric Encryption
11%
Secure Link
11%
Secure Communication
11%
Public Internet
11%
Adaptation Layer
11%
Scyther
11%
Exclusive-OR
11%
Key Exchange Protocol
11%
Security Strength
11%
Session Key
11%
Network Entity
11%
Authenticated Key Exchange
11%
SHA-3
11%
Computer Science
remote user authentication
100%
authentication scheme
100%
Internet-Of-Things
100%
Security and Privacy
27%
Security Analysis
18%
Wireless Networks
9%
Authentication
9%
Malicious Attack
9%
Internet of Things Device
9%
Communication Overhead
9%
Remote Application
9%
Symmetric Encryption
9%
Computational Cost
9%
Secure Communication
9%
random oracle model
9%
Authenticated Key Exchange
9%
Public Internet
9%
Adaptation Layer
9%
Secure Hash Algorithm
9%