Login / Signup
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure.
Feifei Wang
Guosheng Xu
Guoai Xu
Yuejie Wang
Junhao Peng
Published in:
Wirel. Commun. Mob. Comput. (2020)
Keyphrases
</>
cloud computing
authentication scheme
secret key
authentication protocol
public key
computing resources
distributed computing
data management
smart card
user authentication
security issues
diffie hellman
database
security analysis
secure communication
key management
similarity search
databases
real time