[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Imine et al., 2018 - Google Patents

MASFOG: An efficient mutual authentication scheme for fog computing architecture

Imine et al., 2018

Document ID
12018934979863152776
Author
Imine Y
Kouicem D
Bouabdallah A
Ahmed L
Publication year
Publication venue
2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE)

External Links

Snippet

Fog computing is a new paradigm which extends cloud computing services into the edge of the network. Indeed, it aims to pool edge resources in order to deal with cloud's shortcomings such as latency problems. However, this proposal does not ensure the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Similar Documents

Publication Publication Date Title
Xu et al. An identity management and authentication scheme based on redactable blockchain for mobile networks
Cheng et al. A blockchain-based mutual authentication scheme for collaborative edge computing
CN111371730B (en) Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scene
Imine et al. MASFOG: An efficient mutual authentication scheme for fog computing architecture
Vaidya et al. Robust one-time password authentication scheme using smart card for home network environment
CN101902476B (en) Method for authenticating identity of mobile peer-to-peer user
Mahalle et al. Identity establishment and capability based access control (iecac) scheme for internet of things
Chattaraj et al. A new two-server authentication and key agreement protocol for accessing secure cloud services
CN114710275B (en) Cross-domain authentication and key negotiation method based on blockchain in Internet of things environment
Meng et al. Low-latency authentication against satellite compromising for space information network
Ayub et al. Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication
Siddhartha et al. A lightweight authentication protocol using implicit certificates for securing IoT systems
Zahoor et al. An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
Sadhukhan et al. Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication
Xiong et al. An anonymous authentication protocol with delegation and revocation for content delivery networks
Khan et al. Energy-efficient mutual authentication protocol for handhled devices based on public key cryptography
Bicakci et al. Server assisted signatures revisited
Shahidinejad et al. Blockchain-based self-certified key exchange protocol for hybrid electric vehicles
CN114095229B (en) Method, device and system for constructing data transmission protocol of energy internet
CN107248997A (en) Authentication method based on smart card under environment of multi-server
Chen et al. Provable secure group key establishment scheme for fog computing
KR100456624B1 (en) Authentication and key agreement scheme for mobile network
CN117221883A (en) Security authentication method for 5G mobile edge calculation and related equipment
Liu et al. Enabling secure mutual authentication and storage checking in cloud-assisted IoT
Amor et al. A secure fog-based communication scheme