1 results sorted by ID
Possible spell-corrected query: rns-3
An efficient and provably secure authenticated key agreement scheme for mobile edge computing
Mohammad Amin Rakeei, Farokhlagha Moazami
Cryptographic protocols
Though Mobile Cloud Computing (MCC) and
Mobile Edge Computing (MEC) technologies have brought more
convenience to mobile services over past few years, but security
concerns like mutual authentication, user anonymity, user
untraceability, etc., have yet remained unresolved. In recent years,
many efforts have been made to design security protocols in the
context of MCC and MEC, but most of them are prone to security
threats. In this paper, we analyze Jia et al.’s scheme, one of the
latest...
An efficient and provably secure authenticated key agreement scheme for mobile edge computing
Mohammad Amin Rakeei, Farokhlagha Moazami
Cryptographic protocols
Though Mobile Cloud Computing (MCC) and Mobile Edge Computing (MEC) technologies have brought more convenience to mobile services over past few years, but security concerns like mutual authentication, user anonymity, user untraceability, etc., have yet remained unresolved. In recent years, many efforts have been made to design security protocols in the context of MCC and MEC, but most of them are prone to security threats. In this paper, we analyze Jia et al.’s scheme, one of the latest...