Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud Environments

Anonymous authentication with key exchange is an important technique for any subject who attempts to access sensitive cloud services without compromising his/her identity. However, most so-called anonymous authentication schemes, also known as dynamic authentication protocols, only consider and offe...

Full description

Saved in:
Bibliographic Details
Published inIEEE systems journal Vol. 13; no. 2; pp. 1608 - 1617
Main Author Lin, Han-Yu
Format Journal Article
LanguageEnglish
Published New York IEEE 01.06.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…