Sei sulla pagina 1di 20

Skip to Main Content

A Privacy Preserving
Authentication Mechanism for
Secure Fog Network Formation
by Bilal Bokhari

FILE SYNOPSIS-PREP.DOCX (136.24K)


TIME SUBMITTED 22-OCT-2019 04:04AM (UTC-0700) WORD COUNT 4022
SUBMISSION ID 1197950089 CHARACTER COUNT 22269
A Privacy Preserving Authentication Mechanism for Secure Fog
Network Formation
ORIGINALITY REPORT

% 45
SIMILARITY INDEX
% 26
INTERNET SOURCES
% 39
PUBLICATIONS
% 24
STUDENT PAPERS

PRIMARY SOURCES

1
link.springer.com
Internet Source % 10
2
pdfs.semanticscholar.org
Internet Source %4
3
Arij Ben Amor, Mohamed Abid, Aref Meddeb. "A
Privacy-Preserving Authentication Scheme in an
%4
Edge-Fog Environment", 2017 IEEE/ACS 14th
International Conference on Computer Systems
and Applications (AICCSA), 2017
Publication

4
ijns.jalaxy.com.tw
Internet Source %4
5
Jing Wang, Libing Wu, Kim-Kwang Raymond
Choo, Debiao He. "Blockchain Based
%3
Anonymous Authentication with Key
Management for Smart Grid Edge Computing
Infrastructure", IEEE Transactions on Industrial
Informatics, 2019
Publication
Kashif Munir, Lawan A. Mohammed. "chapter 6
6
Comparing User Authentication Techniques for 3
%
Fog Computing", IGI Global, 2019
Publication

7
Fei Wang, Yongjun Xu, Liehuang Zhu, Xiaojiang
Du, Mohsen Guizani. "LAMANCO: A Lightweight
3
%
Anonymous Mutual Authentication Scheme for
$N$ -Times Computing Offloading in IoT", IEEE
Internet of Things Journal, 2019
Publication

8
Submitted to Higher Education Commission
Pakistan
2
%
Student Paper

9
linknovate.com
Internet Source 1
%

10
Submitted to University of Johannsburg
Student Paper 1
%

11
Youcef Imine, Djamel Eddine Kouicem,
Abdelmadjid Bouabdallah, Lounis Ahmed.
1
%
"MASFOG: An Efficient Mutual Authentication
Scheme for Fog Computing Architecture", 2018
17th IEEE International Conference On Trust,
Security And Privacy In Computing And
Communications/ 12th IEEE International
Conference On Big Data Science And
Engineering (TrustCom/BigDataSE), 2018
Publication
12
Prosanta Gope. "LAAP: Lightweight anonymous
authentication protocol for D2D-Aided fog
1
%
computing paradigm", Computers & Security,
2019
Publication

13
Mohammad Wazid, Ashok Kumar Das, Neeraj
Kumar, Athanasios V. Vasilakos. "Design of
1
%
secure key management and user
authentication scheme for fog computing
services", Future Generation Computer
Systems, 2019
Publication

14
Mohammad Wazid, Ashok Kumar Das, Saru
Kumari, Xiong Li, Fan Wu. "Provably secure
1
%
biometric-based user authentication and key
agreement scheme in cloud computing",
Security and Communication Networks, 2016
Publication

15
shivindia-ghana.edu.gh
Internet Source 1
%

16
Submitted to College of Engineering Trivandrum
Student Paper 1
%

17
Mithun Mukherjee, Rakesh Matam, Lei Shu,
Leandros Maglaras, Mohamed Amine Ferrag,
1
%
Nikumani Choudhury, Vikas Kumar. "Security
and Privacy in Fog Computing: Challenges",
IEEE Access, 2017
Publication

18
dspace.cc.tut.fi
Internet Source <%1
19
ieeexplore.ieee.org
Internet Source <%1
20
Mohammad Wazid, Ashok Kumar Das, Saru
Kumari, Xiong Li, Fan Wu. "Design of an
<%1
efficient and provably secure anonymity
preserving three-factor user authentication and
key agreement scheme for TMIS", Security and
Communication Networks, 2016
Publication

21
Durbadal Chattaraj, Monalisa Sarma, Ashok
Kumar Das, Neeraj Kumar, Joel J. P. C.
<%1
Rodrigues, Youngho Park. "HEAP: An Efficient
and Fault-tolerant Authentication and Key
Exchange Protocol for Hadoop-assisted Big
Data Platform", IEEE Access, 2018
Publication

22
Submitted to Harrisburg University of Science
and Technology
<%1
Student Paper

23
Submitted to South Dakota Board of Regents
Student Paper <%1
24
Submitted to University of Northumbria at
Newcastle
<%1
Student Paper

25
"Wireless Algorithms, Systems, and
Applications", Springer Nature, 2015
<%1
Publication

26
Freeman, Harvey, and Tao Zhang. "The
emerging era of fog computing and networking
<%1
[The President's Page]", IEEE Communications
Magazine, 2016.
Publication

EXCLUDE QUOTES ON EXCLUDE MATCHES OFF


EXCLUDE ON
BIBLIOGRAPHY

Potrebbero piacerti anche