Effective Mutual Authentication Scheme and Message Authentication for Internet of Things (IoT) using Fog Computing Technology.
Salwan Rafa HomadiOmar A. DawoodPublished in: DeSE (2023)
Keyphrases
- authentication scheme
- user authentication
- smart card
- secret key
- key technologies
- cost effective
- key management
- image authentication
- security analysis
- elliptic curve cryptography
- big data
- public key
- authentication protocol
- mobile devices
- security flaws
- cloud computing
- web services
- least significant bit
- smart objects
- real time