A secure access method in English education network based on edge computing
With the rapid progress of edge computing, authentication key negotiation protocols, as one of the key means to ensure secure communication, have attracted widespread attention. However, current authentication key negotiation protocols designed for mobile edge computing are often difficult to balanc...
Saved in:
| Main Authors: | Yu Bi, Tian Su |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2025-09-01
|
| Series: | Alexandria Engineering Journal |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S1110016825008567 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Method for Service Function Chain Migration Based on Server Failure Prediction in Mobile Edge Computing Environment
by: Joelle Kabdjou, et al.
Published: (2025-01-01) -
Optimization of pressure parboiling conditions and pre-conditioned moisture content of brown rice (unpolished rice) for microwave puffing and its comparison with hot sand bed puffing
by: Ajay Kumar Swarnakar, et al.
Published: (2020-01-01) -
Survey on computation offloading in mobile edge computing
by: Renchao XIE, et al.
Published: (2018-11-01) -
RANCANG BANGUN SISTEM PENGAWASAN PEMAKAIAN ALAT PELINDUNG DIRI BERBASIS SINGLE BOARD COMPUTER
by: Pungky Irlan Hidayat, et al.
Published: (2024-04-01) -
Β-FeOOH modified polyurethane foam for efficient adsorption of arsenite and arsenate from contaminated water
by: Qiang Li, et al.
Published: (2025-07-01)