Login / Signup
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments.
Ping Wang
Bin Li
Hongjin Shi
Yaosheng Shen
Ding Wang
Published in:
Secur. Commun. Networks (2019)
Keyphrases
</>
computing environments
factor authentication
cloud computing
trusted computing
mobile computing
computing platform
mobile terminals
mobile devices
mobile agents
data center
distributed computing
location information
peer to peer
multimedia
smart card
computer simulation
low cost