Imine et al., 2018 - Google Patents
MASFOG: An efficient mutual authentication scheme for fog computing architectureImine et al., 2018
- Document ID
- 12018934979863152776
- Author
- Imine Y
- Kouicem D
- Bouabdallah A
- Ahmed L
- Publication year
- Publication venue
- 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE)
External Links
Snippet
Fog computing is a new paradigm which extends cloud computing services into the edge of the network. Indeed, it aims to pool edge resources in order to deal with cloud's shortcomings such as latency problems. However, this proposal does not ensure the …
- 238000010200 validation analysis 0 description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
- G06F9/546—Message passing systems or structures, e.g. queues
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xu et al. | An identity management and authentication scheme based on redactable blockchain for mobile networks | |
Cheng et al. | A blockchain-based mutual authentication scheme for collaborative edge computing | |
CN111371730B (en) | Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scene | |
Imine et al. | MASFOG: An efficient mutual authentication scheme for fog computing architecture | |
Vaidya et al. | Robust one-time password authentication scheme using smart card for home network environment | |
CN101902476B (en) | Method for authenticating identity of mobile peer-to-peer user | |
Mahalle et al. | Identity establishment and capability based access control (iecac) scheme for internet of things | |
Chattaraj et al. | A new two-server authentication and key agreement protocol for accessing secure cloud services | |
CN114710275B (en) | Cross-domain authentication and key negotiation method based on blockchain in Internet of things environment | |
Meng et al. | Low-latency authentication against satellite compromising for space information network | |
Ayub et al. | Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication | |
Siddhartha et al. | A lightweight authentication protocol using implicit certificates for securing IoT systems | |
Zahoor et al. | An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF | |
Sadhukhan et al. | Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication | |
Xiong et al. | An anonymous authentication protocol with delegation and revocation for content delivery networks | |
Khan et al. | Energy-efficient mutual authentication protocol for handhled devices based on public key cryptography | |
Bicakci et al. | Server assisted signatures revisited | |
Shahidinejad et al. | Blockchain-based self-certified key exchange protocol for hybrid electric vehicles | |
CN114095229B (en) | Method, device and system for constructing data transmission protocol of energy internet | |
CN107248997A (en) | Authentication method based on smart card under environment of multi-server | |
Chen et al. | Provable secure group key establishment scheme for fog computing | |
KR100456624B1 (en) | Authentication and key agreement scheme for mobile network | |
CN117221883A (en) | Security authentication method for 5G mobile edge calculation and related equipment | |
Liu et al. | Enabling secure mutual authentication and storage checking in cloud-assisted IoT | |
Amor et al. | A secure fog-based communication scheme |