标题
A secure authenticated and key exchange scheme for fog computing
作者
关键词
-
出版物
Enterprise Information Systems
Volume -, Issue -, Pages 1-16
出版商
Informa UK Limited
发表日期
2020-01-10
DOI
10.1080/17517575.2020.1712746
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- A provably secure certificateless public key encryption with keyword search
- (2019) Tsu-Yang Wu et al. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS
- Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
- (2019) Hu Xiong et al. Future Generation Computer Systems-The International Journal of eScience
- An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure
- (2019) Khalid Mahmood et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks
- (2019) Km Renuka et al. SENSORS
- Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
- (2019) Khwaja Mansoor et al. SENSORS
- High-Utility Itemset Mining with Effective Pruning Strategies
- (2019) Jimmy Ming-Tai Wu et al. ACM Transactions on Knowledge Discovery from Data
- Novel Parallel Heterogeneous Meta-Heuristic and Its Communication Strategies for the Prediction of Wind Power
- (2019) Jeng-Shyang Pan et al. Processes
- Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications
- (2018) Dariush Abbasinezhad-Mood et al. Future Generation Computer Systems-The International Journal of eScience
- Anonymous and secure aggregation scheme in fog-based public cloud computing
- (2018) Huaqun Wang et al. Future Generation Computer Systems-The International Journal of eScience
- Authenticated key agreement scheme for fog-driven IoT healthcare system
- (2018) Xiaoying Jia et al. WIRELESS NETWORKS
- Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
- (2018) Chien-Ming Chen et al. Journal of Ambient Intelligence and Humanized Computing
- Protective Measures and Security Policy Non-Compliance Intention
- (2018) Kuo-Chung Chang et al. Journal of Organizational and End User Computing
- Design of secure key management and user authentication scheme for fog computing services
- (2018) Mohammad Wazid et al. Future Generation Computer Systems-The International Journal of eScience
- e-DMDAV: A new privacy preserving algorithm for wearable enterprise information systems
- (2017) Zhenjiang Zhang et al. Enterprise Information Systems
- Traumatic leaflet injury: comparison of porcine leaflet self-expandable and bovine leaflet balloon-expandable prostheses
- (2017) Channing Convelbo et al. EUROPEAN JOURNAL OF CARDIO-THORACIC SURGERY
- Cooperative Fog Computing for Dealing with Big Data in the Internet of Vehicles: Architecture and Hierarchical Resource Management
- (2017) Wenyu Zhang et al. IEEE COMMUNICATIONS MAGAZINE
- Survey on fog computing: architecture, key technologies, applications and open issues
- (2017) Pengfei Hu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
- (2017) King-Hang Wang et al. JOURNAL OF SUPERCOMPUTING
- A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
- (2017) Chun-Ta Li et al. SOFT COMPUTING
- A secure authentication scheme for Internet of Things
- (2017) King-Hang Wang et al. Pervasive and Mobile Computing
- A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography
- (2017) Hadeal Abdulaziz Al Hamid et al. IEEE Access
- Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
- (2017) Pengfei Hu et al. IEEE Internet of Things Journal
- End-to-end security scheme for mobility enabled healthcare Internet of Things
- (2016) Sanaz Rahimi Moosavi et al. Future Generation Computer Systems-The International Journal of eScience
- A provable authenticated group key agreement protocol for mobile environment
- (2015) Hung-Min Sun et al. INFORMATION SCIENCES
- A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety
- (2015) Chunhua Jin et al. JOURNAL OF MEDICAL SYSTEMS
- A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices
- (2015) Yuh-Min Tseng et al. International Journal of Distributed Sensor Networks
- Finding your Way in the Fog
- (2014) Luis M. Vaquero et al. ACM SIGCOMM Computer Communication Review
- Enhanced three-factor security protocol for consumer USB mass storage devices
- (2014) Debiao He et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack
- (2014) SK Hafizul Islam WIRELESS PERSONAL COMMUNICATIONS
- A Survey of SIP Authentication and Key Agreement Schemes
- (2013) H. Hakan Kilinc et al. IEEE Communications Surveys and Tutorials
- Cloud computing security: The scientific challenge, and a survey of solutions
- (2013) Mark D. Ryan JOURNAL OF SYSTEMS AND SOFTWARE
- Strongly secure identity-based authenticated key agreement protocols
- (2011) Liang Ni et al. COMPUTERS & ELECTRICAL ENGINEERING
- A Robust Mutual Authentication Protocol for Wireless Sensor Networks
- (2010) Tien-Ho Chen ETRI JOURNAL
- The Case for Cloud Computing
- (2009) R.L. Grossman IT Professional
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now