2021
DOI: 10.1109/tdsc.2019.2909890
|View full text |Cite
|
Sign up to set email alerts
|

Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(26 citation statements)
references
References 37 publications
0
26
0
Order By: Relevance
“…RELATED WORK Credential management and key management protocols are a critical functionality to maintain the security of modern control systems. Different studies have examined the robustness and reliability of such protocols to secure industrial control systems using formal methods [5], [8], [9], [15], [17], [19], [24].…”
Section: F Results and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…RELATED WORK Credential management and key management protocols are a critical functionality to maintain the security of modern control systems. Different studies have examined the robustness and reliability of such protocols to secure industrial control systems using formal methods [5], [8], [9], [15], [17], [19], [24].…”
Section: F Results and Discussionmentioning
confidence: 99%
“…Li et al [15] extend the state of the art key management protocol MAKA with a prompt user revocation we propose a provable dynamic revocable three-factor and provide a formal security proof in the random oracle. However, the analysis does not explore the entire state space, thus no absolute guarantee about the reliability can be delivered.…”
Section: F Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We limit the related work discussion due to the restricted manuscript size. We suggest readers of this manuscript to refer other ECC based RUA schemes for further references [22], [23], [24], [19].…”
Section: A Related Workmentioning
confidence: 99%
“…The Gen algorithm produces output from the input of a reading (B) of the user's biometric as a public helper string (S) and an extracted string (R), namely, Gen (B) = (R, S). The Rep algorithm accepts S and the subsequent biometric reading (BL) as input and outputs R, namely, Rep (BL, S) = R. This FE is described in detail in [40][41][42][43].…”
Section: ) Fuzzy Extractor (Fe)mentioning
confidence: 99%