Comment on 'ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications'.
Azeem IrshadShehzad Ashraf ChaudhryPublished in: IET Networks (2021)
Keyphrases
- cloud computing
- key management
- symmetric key
- secure manner
- key distribution
- private key
- identity management
- public key
- big data
- elliptic curve
- security mechanisms
- public key cryptography
- security analysis
- security protocols
- security requirements
- resource constrained
- user authentication
- authentication scheme
- authentication mechanism
- authentication protocol
- wireless sensor networks
- image encryption
- password authentication
- digital signature
- cellular automata
- factor authentication
- image authentication
- secret sharing scheme
- signature scheme
- security issues
- data encryption
- diffie hellman
- public key cryptosystem
- ad hoc networks
- management system
- secure communication
- security services
- group communication
- secret key
- trusted computing
- integrity verification
- smart card
- mutual authentication
- public key infrastructure
- encryption algorithm
- ciphertext