Skip to main content

Table 2 Notations

From: Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

Notations

Description

\(CSID_{j}\)

\(S_j\)’s identity

\(UID_{i}\)

\(U_{i}\)’s identity

\(UPW_{i}\)

\(U_{i}\)’s password

\(BIO_{i}\)

\(U_{i}\)’s biometric

x

TCS’s private secret key