Login / Signup
Effective charging identity authentication scheme based on fog computing in V2G networks.
Zhuoqun Xia
Zhenwei Fang
Ke Gu
Jin Wang
Jingjing Tan
Guanghui Wang
Published in:
J. Inf. Secur. Appl. (2021)
Keyphrases
</>
authentication scheme
smart card
user authentication
high dimensional
distributed systems
image compression
cost effective
distributed environment
computer networks