Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing.
Tsu-Yang WuZhiyuan LeeYanyu HuangChien-Ming ChenYeh-Cheng ChenPublished in: ICCE-TW (2019)
Keyphrases
- cloud computing
- security analysis
- authentication protocol
- smart card
- public key
- security requirements
- data management
- mutual authentication
- lightweight
- user authentication
- distributed systems
- security issues
- computer networks
- encryption algorithm
- encryption scheme
- databases
- rfid systems
- database
- real time
- loosely coupled
- information security
- distributed environment
- query processing