A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing
- 1 December 2021
- journal article
- research article
- Published by Elsevier BV in Journal of Information Security and Applications
Abstract
No abstract availableKeywords
Funding Information
- National Natural Science Foundation of China
This publication has 36 references indexed in Scilit:
- Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor NetworksSensors, 2016
- Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional BoundIEEE Transactions on Dependable and Secure Computing, 2016
- A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor NetworksIEEE Transactions on Wireless Communications, 2015
- Security and Privacy Issues of Fog Computing: A SurveyPublished by Springer Science and Business Media LLC ,2015
- Comments on two schemes of identity-based user authentication and key agreement for mobile client–server networksThe Journal of Supercomputing, 2015
- A provable privacy-protection system for multi-server environmentNonlinear Dynamics, 2015
- A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart CardsIEEE Transactions on Information Forensics and Security, 2015
- A Novel Remote User Authentication Scheme from Bilinear Pairings Via InternetWireless Personal Communications, 2015
- Towards generalized ID-based user authentication for mobile multi-server environmentInternational Journal of Communication Systems, 2011
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983