Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments.
Hakjun LeeJihyeon RyuDongho WonPublished in: IEEE Internet Things J. (2024)
Keyphrases
- computing environments
- authentication scheme
- user authentication
- smart card
- mobile environments
- mobile computing
- secret key
- security flaws
- public key
- authentication protocol
- security analysis
- trusted computing
- mobile agents
- key management
- peer to peer
- mutual authentication
- information security
- data sharing
- end to end
- computing platform
- mobile clients
- information systems