An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy- Preserving of IoT Devices in Mobile Edge Computing
This document is hosted externally.
Unless the owner has removed it from the web, you can access the full document via its original URL:
https://jit.ndhu.edu.tw/article/download/2689/2711Unless the owner has removed it from the web, you can access the full document via its original URL:
See similar contracts (1)
Alternatively, you can try searching for similar contracts: