An authentication scheme for distributed computing environment.
Saeed Ullah JanFawad QayumPublished in: Int. J. Inf. Comput. Secur. (2020)
Keyphrases
- authentication scheme
- distributed computing environment
- distributed processing
- distributed computing systems
- smart card
- distributed computing
- distributed environment
- computing environments
- user authentication
- secret key
- authentication protocol
- security flaws
- public key
- security analysis
- resource discovery
- parallel processing
- key management
- data distribution
- computer systems
- data warehouse
- wireless sensor networks