2020
DOI: 10.1080/17517575.2020.1712746
|View full text |Cite
|
Sign up to set email alerts
|

A secure authenticated and key exchange scheme for fog computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
83
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 118 publications
(88 citation statements)
references
References 51 publications
0
83
0
Order By: Relevance
“…Based on the above discussion, the comparison on security among [35], [27], [21], [17], [22] and the proposed protocol is described in Table 6. We can notice the protocol can provide more security services than others.…”
Section: Other Security Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the above discussion, the comparison on security among [35], [27], [21], [17], [22] and the proposed protocol is described in Table 6. We can notice the protocol can provide more security services than others.…”
Section: Other Security Discussionmentioning
confidence: 99%
“…In 2019, Ma et al [16] improved Jia et al's [15] scheme and proposed a new novel scheme to support Vehicular Ad hoc Network (VANET) by eliminating the need for bilinear pairings. Meanwhile, in 2020, Chen et al [17] pointed out the Jia et al's scheme is vulnerable to an ephemeral secret leakage attack.…”
Section: Related Workmentioning
confidence: 99%
“…Step1: The traffic flow data collected by ground monitors are denoised by wavelet analysis in order to remove the interference signals. In the process of data monitoring, some encryption technologies [23,24,[29][30][31][32]…”
Section: B Application Of Qga-lvq Neural Network In Short-term Traffmentioning
confidence: 99%
“…At present, with the rapid development of computer technology [2][3][4][5][6], intelligent computing is one of the important methods of intelligent science, and it is also a cutting-edge subject of information technology. The intelligent computing technologies and new methods developed in recent years have been widely used in many disciplines, and have achieved fruitful results in military, financial engineering, nonlinear system optimization, knowledge engineering, and computer-aided medical diagnosis.…”
Section: Introductionmentioning
confidence: 99%