From: Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
Notations
Description
\(CSID_{j}\)
\(S_j\)’s identity
\(UID_{i}\)
\(U_{i}\)’s identity
\(UPW_{i}\)
\(U_{i}\)’s password
\(BIO_{i}\)
\(U_{i}\)’s biometric
x
TCS’s private secret key