Design of secure key management and user authentication scheme for fog computing services.
Mohammad WazidAshok Kumar DasNeeraj KumarAthanasios V. VasilakosPublished in: Future Gener. Comput. Syst. (2019)
Keyphrases
- authentication scheme
- key management
- user authentication
- security services
- key distribution
- secret key
- ad hoc networks
- wireless sensor networks
- resource constrained
- key management scheme
- security analysis
- smart card
- digital signature
- security protocols
- provably secure
- group communication
- public key
- information security
- authentication protocol
- information systems
- secret sharing scheme
- elliptic curve
- embedded systems
- web services