An Authenticated Accumulator Scheme for Secure Master Key Access in Microservice Architectures

被引:0
|
作者
Salin, Hannes [1 ]
Fokin, Dennis [2 ]
机构
[1] Department of Information and Communication Technology, Swedish Transport Administration, Borlänge, Sweden
[2] Sweden
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Ecosystems
引用
收藏
页码:119 / 126
相关论文
共 50 条
  • [11] An efficient and provably secure authenticated key agreement scheme for mobile edge computing
    Rakeei, Mohammadamin
    Moazami, Farokhlagha
    WIRELESS NETWORKS, 2022, 28 (07) : 2983 - 2999
  • [12] A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks
    Imran Memon
    Wireless Personal Communications, 2015, 85 : 1167 - 1191
  • [14] Strongly secure certificateless one-pass authenticated key agreement scheme
    Huang, Baojun
    Tu, Hang
    KUWAIT JOURNAL OF SCIENCE, 2015, 42 (01) : 91 - 108
  • [15] Secure authenticated key exchange protocol based on EC using signcryption scheme
    Kim, Rack-Hyun
    Youm, Heung-Youl
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 74 - +
  • [16] An efficient and provably secure authenticated key agreement scheme for mobile edge computing
    Mohammadamin Rakeei
    Farokhlagha Moazami
    Wireless Networks, 2022, 28 : 2983 - 2999
  • [17] Secure Location-based Authenticated Key Establishment Scheme for Maritime Communication
    Agrawal, Saurabh
    Vangala, Anusha
    Das, Ashok Kumar
    Kumar, Neeraj
    Shetty, Sachin
    Das, Sajal K.
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 1927 - 1932
  • [18] Hierarchical Key Management Scheme with Multilevel Secure Access
    Ma, Mingxin
    Yang, Xiaotong
    Shi, Guozhen
    Li, Fenghua
    2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 97 - 102
  • [19] A secure authenticated key agreement protocol
    Popescu, C
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [20] An authenticated secure image hiding scheme
    Lee, W-B
    Li, J-H
    Chen, S-C
    Chen, T-H
    IMAGING SCIENCE JOURNAL, 2009, 57 (02): : 109 - 117