• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Effective charging identity authentication scheme based on fog computing in V2G networks.

Zhuoqun XiaZhenwei FangKe GuJin WangJingjing TanGuanghui Wang
Published in: J. Inf. Secur. Appl. (2021)
Keyphrases
  • authentication scheme
  • smart card
  • user authentication
  • high dimensional
  • distributed systems
  • image compression
  • cost effective
  • distributed environment
  • computer networks