WeChat Mini Program
Old Version Features

A Security Enhanced Chaotic-Map Based Authentication Protocol for Internet of Drones

IEEE INTERNET OF THINGS JOURNAL(2024)

Cited 9|Views16
Key words
Protocols,Security,Drones,Authentication,Chaotic communication,Chebyshev approximation,Biometrics (access control),Anonymity,authentication,impersonation attack,mutual authentication,security
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined