Dates are inconsistent

Dates are inconsistent

1 results sorted by ID

Possible spell-corrected query: rns-3
2020/1566 (PDF) Last updated: 2021-01-16
An efficient and provably secure authenticated key agreement scheme for mobile edge computing
Mohammad Amin Rakeei, Farokhlagha Moazami
Cryptographic protocols

Though Mobile Cloud Computing (MCC) and Mobile Edge Computing (MEC) technologies have brought more convenience to mobile services over past few years, but security concerns like mutual authentication, user anonymity, user untraceability, etc., have yet remained unresolved. In recent years, many efforts have been made to design security protocols in the context of MCC and MEC, but most of them are prone to security threats. In this paper, we analyze Jia et al.’s scheme, one of the latest...

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.