Efficient Revocable Cross-Domain Anonymous Authentication Scheme for IIoT
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY(2025)
Key words
Authentication,Industrial Internet of Things,Production,Security,Blockchains,Servers,Costs,Real-time systems,Monitoring,Maintenance,Cross-domain authentication,industrial Internet of Things (IIoT),dynamic accumulator
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined