C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Effective charging identity authentication scheme based on fog computing in V2G networks.
Zhuoqun Xia
Zhenwei Fang
Ke Gu
Jin Wang
Jingjing Tan
Guanghui Wang
Published in:
J. Inf. Secur. Appl. (2021)
Keyphrases
</>
authentication scheme
smart card
user authentication
high dimensional
distributed systems
image compression
cost effective
distributed environment
computer networks