Seamless secure anonymous authentication for cloud-based mobile edge computing.
Bakkiam David DeebakFadi Al-TurjmanLeonardo MostardaPublished in: Comput. Electr. Eng. (2020)
Keyphrases
- factor authentication
- trusted platform module
- user authentication
- authentication protocol
- security analysis
- data encryption
- identity management
- mobile phone
- security mechanisms
- authentication scheme
- cloud computing
- electronic payment
- security requirements
- password authentication
- digital signature scheme
- key distribution
- integrity verification
- authentication mechanism
- mobile devices
- electronic commerce
- secure manner
- public key encryption
- rights management
- payment systems
- trusted third party
- public key cryptography
- security issues
- peer to peer
- trusted computing
- secure communication
- biometric authentication
- public key
- mobile applications
- smart card