Login / Signup

A dynamic anonymous authentication scheme with trusted fog computing in V2G networks.

Wenhua HuangHongyuan DuJingYu FengGang HanWenbo Zhang
Published in: J. Inf. Secur. Appl. (2023)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • image encryption
  • secret key
  • security flaws
  • security analysis
  • authentication protocol
  • image authentication