A Robust and Effective 3-Factor Authentication Protocol for Smart Factory in Iiot
COMPUTER COMMUNICATIONS(2024)
Key words
Authentication,eCK adversary,Industrial internet of things (IIoT),ProVerif
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined