Authentication Protocol for Secure Data Access in Fog Computing-Based Internet of Things.
Priyanka SurendranBindhya ThomasDensy JohnAnupama PrasanthJoy WinstonAbdulKhadar JilaniPublished in: FICTA (2) (2023)
Keyphrases
- data access
- authentication protocol
- data management
- smart card
- security analysis
- data sharing
- password authentication
- security protocols
- lightweight
- public key
- database applications
- secret key
- rfid systems
- authentication mechanism
- data objects
- rfid tags
- sql server
- information systems
- database management systems
- key technologies
- case study
- web pages
- databases
- database