Publication:
Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model
| dc.contributor.author | Patonico, Simone | |
| dc.contributor.author | Braeken, An | |
| dc.contributor.author | Steenhaut, Kris | |
| dc.date.accessioned | 2023-06-29T12:00:19Z | |
| dc.date.available | 2023-04-30T04:07:22Z | |
| dc.date.available | 2023-06-29T12:00:19Z | |
| dc.date.embargo | 2023-04-30 | |
| dc.date.issued | 2023 | |
| dc.identifier.doi | 10.1007/s11276-019-02084-6 | |
| dc.identifier.issn | 1022-0038 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/41507 | |
| dc.publisher | SPRINGER | |
| dc.source.beginpage | 1017 | |
| dc.source.endpage | 1029 | |
| dc.source.issue | 3 | |
| dc.source.journal | WIRELESS NETWORKS | |
| dc.source.numberofpages | 13 | |
| dc.source.volume | 29 | |
| dc.subject.keywords | BIG DATA | |
| dc.subject.keywords | NETWORKS | |
| dc.subject.keywords | INTERNET | |
| dc.subject.keywords | PRIVACY | |
| dc.subject.keywords | FRAMEWORK | |
| dc.subject.keywords | ATTACKS | |
| dc.subject.keywords | HEALTH | |
| dc.title | Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model | |
| dc.type | Journal article | |
| dspace.entity.type | Publication | |
| Files | Original bundle
| |
| Publication available in collections: |