H Liu, M Ai, R Huang, R Qiu, Y Li - … and Computation: Practice …, 2022 - Wiley Online Library
Device identity authentication is the first line of defense for edge computing security
mechanisms. Many authentication schemes are often accompanied by high communication …