A seamless anonymous authentication protocol for mobile edge computing infrastructure.
Khalid MahmoodMuhammad Faizan AyubSyed Zohaib HassanZahid GhaffarZhihan LvShehzad Ashraf ChaudhryPublished in: Comput. Commun. (2022)
Keyphrases
- authentication protocol
- computing infrastructure
- smart card
- cloud computing
- security analysis
- mobile devices
- high performance computing
- lightweight
- security protocols
- public key
- rfid tags
- life sciences
- cost effective
- hash functions
- secret key
- context aware
- high dimensional
- computing environments
- computing systems
- peer to peer
- response time