An Authentication Approach in a Distributed System Through Synergetic Computing
A synergetic computing mechanism is proposed to authenticate the validity of event data in merchandise exchange applications. The events are handled by the proposed synergetic computing system which is composed of edge devices. Asteroid_Node_on_Duty (ANOD) acts like a supernode to take the duty of c...
Saved in:
Main Authors: | Jia-Jen Wang, Yaw-Chung Chen, Meng-Chang Chen |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2025-01-01
|
Series: | Computers |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-431X/14/1/16 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Data outsourcing authentication model based on authenticated data structures for cloud computing
by: XU Jian1, et al.
Published: (2011-01-01) -
ESL students english business skills development (based on the authentic movies «The Devil Wears Prada» and «Promised Land»)
by: Irina Y. Sukhanova
Published: (2015-11-01) -
Research on password-authenticated key exchange protocol over lattices
by: Yuanbo GUO, et al.
Published: (2022-12-01) -
Mutual authentication scheme based on the TPM cloud computing platform
by: Zhen-peng LIU, et al.
Published: (2012-11-01) -
Predicate-based authenticated key exchange protocol with attribute-hiding
by: Wen-fen LIU, et al.
Published: (2012-09-01)