A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing.
Yijian LinXiaoming WangQingqing GanMengting YaoPublished in: J. Inf. Secur. Appl. (2021)
Keyphrases
- authentication scheme
- cross domain
- user authentication
- smart card
- elliptic curve cryptography
- security analysis
- authentication protocol
- security flaws
- public key
- secret key
- key agreement
- security properties
- key management
- transfer learning
- mutual authentication
- knowledge transfer
- text categorization
- image encryption
- security requirements
- information security
- security mechanisms
- password guessing
- diffie hellman
- security protocols
- security model
- security issues
- private key
- trusted third party
- blind signature scheme
- access control
- security policies
- intrusion detection