


default search action
"IoT Authentication Protocols: Challenges, and Comparative Analysis."
Amar N. Alsheavi et al. (2025)
- Amar N. Alsheavi
, Ammar Hawbani
, Wajdy Othman
, Xingfu Wang
, Gamil R. S. Qaid, Liang Zhao
, Ahmed Yassin Al-Dubai
, Zhi Liu
, A. S. Ismail, Rutvij H. Jhaveri
, Saeed H. Alsamhi
, Mohammed A. A. Al-qaness
:
IoT Authentication Protocols: Challenges, and Comparative Analysis. ACM Comput. Surv. 57(5): 116:1-116:43 (2025)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.