Login / Signup
Authentication of fog-assisted IoT networks using Advanced Encryption credibility approach with modified Diffie-Hellman encryption.
Mohammad Luqman
Arman Rasool Faridi
Published in:
Concurr. Comput. Pract. Exp. (2023)
Keyphrases
</>
diffie hellman
symmetric key
key management
key exchange
encryption scheme
security analysis
secret key
security properties
secure communication
public key cryptography
elliptic curve
key distribution
public key
ciphertext
private key
standard model
key agreement
security requirements
wireless sensor networks
key agreement protocol
digital signature
encryption algorithm
group communication
authentication scheme
ad hoc networks
smart card
mutual authentication
wireless ad hoc networks
key exchange protocol
authentication protocol
security services
security mechanisms
data sharing
resource constrained
lossless compression
signature scheme
formal model
cloud computing
routing algorithm
computer networks