Z Xing, Y Huang, Y Lan, X Yang,
Y Yu, X Cui, D Yu - poster-openaccess.com
In some IoT (Internet of Things) Machine-to-Machine (M2M) scenarios, existing device
authentication schemes often struggle to balance security, lightweight design, and flexibility …