Sign in

Identity authentication for edge devices based on zero-trust architecture.

Haiqing LiuMing AiRong HuangRixuan QiuYuancheng Li
Published in: Concurr. Comput. Pract. Exp. (2022)
Keyphrases
  • identity authentication
  • mobile commerce
  • mobile devices
  • trust model
  • data protection
  • information systems
  • data collection
  • software architecture