Login / Signup
A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing.
Xiaoying Jia
Min Luo
Kim-Kwang Raymond Choo
Li Li
Debiao He
Published in:
IEEE Internet Things J. (2022)
Keyphrases
</>
authentication scheme
key management
smart card
secret key
user authentication
security flaws
public key
security analysis
authentication protocol
intrusion detection
encryption scheme
digital images
diffie hellman
blind signature scheme