Login / Signup
An Identity-Based Authentication Scheme With Full Anonymity and Unlinkability for Mobile Edge Computing.
Junfeng Tian
Yiting Wang
Yue Shen
Published in:
IEEE Internet Things J. (2024)
Keyphrases
</>
authentication scheme
key management
secret key
privacy protection
smart card
user authentication
security flaws
encryption scheme
mobile devices
public key
security analysis
signature scheme
authentication protocol
key distribution
blind signature scheme
security properties
cost effective