[1]
Sujatha, K. , Sasireka, D. , Ayyadurai, M. , Indumathi, G. and Bharathi, M. 2025. Trustworthy mutual user authentication technique using id in fog computing. Edelweiss Applied Science and Technology. 9, 4 (Apr. 2025), 841–855. DOI:https://doi.org/10.55214/25768484.v9i4.6113.