Login / Signup
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing.
Awaneesh Kumar Yadav
An Braeken
Manoj Misra
Published in:
J. Supercomput. (2023)
Keyphrases
</>
public key cryptography
digital signature
public key
security services
elliptic curve
key distribution
security model
authentication protocol
provably secure
third party
smart card
secure communication
diffie hellman
intrusion detection
key management
security analysis