Author:
Al-Samhouri Mohamad,Abur-rous Maher,Novas Nuria
Publisher
Springer Nature Switzerland
Reference12 articles.
1. T. Wu, T. Wang, Y. Lee, W. Zheng, S. Kumari, S. Kumar, Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur. Commun. Netw. 2021, 6658041 (2021)
2. S. Patonico, A. Braeken, K. Steenhaut, Identity-based and Anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model. Wirel. Netw. 29, 1017–1029 (2023)
3. X. Jia, D. He, N. Kumar, K.R. Choo, Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 25(8), 4737–4750 (2018)
4. J. Ni, K. Zhang, X. Lin, X. Shen, Securing fog computing for Internet of things applications: Challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601–628 (2018)
5. J. Mo, Z. Hu, H. Chen, W. Shen, An efficient and provably secure Anonymous user authentication and key agreement for mobile cloud computing. Wirel. Commun. Mob. Comput. 2019, 1–12 (2019)