Smart verification algorithm for IoT applications using QR tag
Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Conference Paper |
Published: |
Springer Verlag
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!