Return to Article Details An Authentication Scheme Using Locations and OAuth in IoT Environments Download Download PDF