Research Article
A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems
| Symbols | Explanations |
| | Trusted control center | | User, UAV | | Real and pseudo-identities of user | | Public private key pair of | | Secret keys of and | | Pseudo-identity of | | Concatenation, XOR, hash | | Enc-decryption using as key |
|
|