A user authentication method for M2M environments

5Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The request about green IT technology is increasing recently. M2M is more request to IT Technology for Cloud computing. And effective use request of computer resource is increasing. So, necessity about Cloud computing is increasing rapidly thereby. However, Cloud computing environment have big security problems because embody using virtualization technology. It is Authentication that must solve in Cloud computing environment urgently. Therefore, we wishes to propose protocol that can solve suitable user and services certification in cloud computing environment. An novel authentication protocol that based on Kerberos. But it is faster than Kerberos and implement is easy. © 2012 Springer Science+Business Media B.V.

Author supplied keywords

Cite

CITATION STYLE

APA

Kim, J. M., Jeong, H. Y., & Hong, B. H. (2012). A user authentication method for M2M environments. In Lecture Notes in Electrical Engineering (Vol. 114 LNEE, pp. 589–595). https://doi.org/10.1007/978-94-007-2792-2_56

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free