2003
DOI: 10.1109/tie.2003.812278
|View full text |Cite
|
Sign up to set email alerts
|

Distributing internet services to the network's edge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
15
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 6 publications
1
15
0
Order By: Relevance
“…Find the key pair (pu, pr) such that pu*pr ≡ 1 mod φ (N), where φ (N) = (a − 1) * (b − 1). [3]. Picks a generator g over the limited field Z*n, where n is a huge odd prime number.…”
Section: System Commencement Phasementioning
confidence: 99%
See 3 more Smart Citations
“…Find the key pair (pu, pr) such that pu*pr ≡ 1 mod φ (N), where φ (N) = (a − 1) * (b − 1). [3]. Picks a generator g over the limited field Z*n, where n is a huge odd prime number.…”
Section: System Commencement Phasementioning
confidence: 99%
“…User authentication is a major part in distributed networks to confirm the user is legitimate or not and can in this way allow access to conveyed service suppliers [3]. To keep away from illicit user access to the services we require strong user verification [1], [2].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…With wide spreading of distributed computer networks, it has become popular to allow users accessing various network services offered by distributed service providers [1], [2]. Consequently, user authentication (also called user identification) [3], [4] plays a crucial role in distributed computer networks to verify if a user is legal and then can be granted to access the services requested.…”
Section: Introductionmentioning
confidence: 99%