ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A clogging resistant secure authentication scheme for fog computing services
Computer Networks
◽
10.1016/j.comnet.2020.107731
◽
2021
◽
Vol 185
◽
pp. 107731
Author(s):
Zeeshan Ali
◽
Shehzad Ashraf Chaudhry
◽
Khalid Mahmood
◽
Sahil Garg
◽
Zhihan Lv
◽
...
Keyword(s):
Fog Computing
◽
Authentication Scheme
◽
Computing Services
◽
Secure Authentication
Download Full-text
Related Documents
Cited By
References
Lightweight and secure authentication scheme for IoT networks based on publish-subscribe fog computing model
Computer Networks
◽
10.1016/j.comnet.2021.108465
◽
2021
◽
pp. 108465
Author(s):
Sanaz Amanlou
◽
Mohmmad Kamrul Hasan
◽
Khairul Azmi Abu Bakar
Keyword(s):
Fog Computing
◽
Authentication Scheme
◽
Computing Model
◽
Secure Authentication
Download Full-text
Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
2018 IEEE/ACM Symposium on Edge Computing (SEC)
◽
10.1109/sec.2018.00059
◽
2018
◽
Cited By ~ 4
Author(s):
Baiyi Huang
◽
Xiuzhen Cheng
◽
Yuan Cao
◽
Le Zhang
Keyword(s):
Fog Computing
◽
Authentication Scheme
◽
Secure Authentication
Download Full-text
Design of secure key management and user authentication scheme for fog computing services
Future Generation Computer Systems
◽
10.1016/j.future.2018.09.017
◽
2019
◽
Vol 91
◽
pp. 475-492
◽
Cited By ~ 45
Author(s):
Mohammad Wazid
◽
Ashok Kumar Das
◽
Neeraj Kumar
◽
Athanasios V. Vasilakos
Keyword(s):
Key Management
◽
User Authentication
◽
Fog Computing
◽
Authentication Scheme
◽
Computing Services
◽
User Authentication Scheme
Download Full-text
Secure Microservices Deployment for Fog Computing Services in a Remote Office
2020 3rd International Conference on Information and Communications Technology (ICOIACT)
◽
10.1109/icoiact50329.2020.9332025
◽
2020
◽
Author(s):
Favian Dewanta
Keyword(s):
Fog Computing
◽
Computing Services
Download Full-text
An Effective Mutual Authentication Scheme for Provisioning Reliable Cloud Computing Services
2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
◽
10.1109/icccis51004.2021.9397113
◽
2021
◽
Author(s):
Sabout Nagaraju
◽
S. K. V. Jayakumar
◽
C Sweth Priya
Keyword(s):
Cloud Computing
◽
Mutual Authentication
◽
Authentication Scheme
◽
Computing Services
◽
Cloud Computing Services
Download Full-text
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
IEEE Systems Journal
◽
10.1109/jsyst.2014.2322973
◽
2015
◽
Vol 9
(3)
◽
pp. 805-815
◽
Cited By ~ 89
Author(s):
Jia-Lun Tsai
◽
Nai-Wei Lo
Keyword(s):
Cloud Computing
◽
Mobile Cloud Computing
◽
Authentication Scheme
◽
Mobile Cloud
◽
Computing Services
◽
Cloud Computing Services
Download Full-text
A secure authentication scheme based on SNR of optical fiber communication channel
Optical Fiber Technology
◽
10.1016/j.yofte.2021.102726
◽
2021
◽
Vol 67
◽
pp. 102726
Author(s):
Xiangqing Wang
◽
Yajie Li
◽
Haokun Song
◽
Kongni Zhu
◽
Jie Zhang
Keyword(s):
Optical Fiber
◽
Communication Channel
◽
Optical Fiber Communication
◽
Authentication Scheme
◽
Fiber Communication
◽
Secure Authentication
Download Full-text
Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments
Wireless Algorithms, Systems, and Applications - Lecture Notes in Computer Science
◽
10.1007/978-3-319-07782-6_50
◽
2014
◽
pp. 554-563
◽
Cited By ~ 1
Author(s):
Arwa Alrawais
◽
Abdulrahman Alhothaily
◽
Xiuzhen Cheng
Keyword(s):
Access Point
◽
Authentication Scheme
◽
Dual Channels
◽
Secure Authentication
◽
Rogue Access Point
Download Full-text
An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks
2018 IEEE International Conference on Communications (ICC)
◽
10.1109/icc.2018.8422101
◽
2018
◽
Cited By ~ 1
Author(s):
M. Rekik
◽
Mohammad S. Obaidat
◽
A. Makhlouf
◽
F. Zarai
Keyword(s):
Ad Hoc Networks
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Hoc Networks
◽
Secure Authentication
Download Full-text
MASHED: Security and privacy-aware mutual authentication scheme for heterogeneous and distributed mobile cloud computing services
Information Security Journal A Global Perspective
◽
10.1080/19393555.2019.1609627
◽
2018
◽
Vol 27
(5-6)
◽
pp. 276-291
Author(s):
Oladayo Olufemi Olakanmi
◽
Samuel Oluwaseye Oke
Keyword(s):
Cloud Computing
◽
Mobile Cloud Computing
◽
Mutual Authentication
◽
Authentication Scheme
◽
Security And Privacy
◽
Mobile Cloud
◽
Computing Services
◽
Cloud Computing Services
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close