From: User authentication and access control to blockchain-based forensic log data
Symbol | Description |
---|---|
H | Hash function, such as SHA-2 |
idik | ID of the ith user of kth edge server |
idk | ID of the kth Edge server |
pwdik | Password of ith user of kth edge server |
TSi | Timestamp of the server for ith user |
Rk | Random Number of kth edge server |
Nik | Nonce for ith user of kth Edge Server |
TSess | Timestamp when computing ESS (Edge Server's Secret) |
Uik | The ith user of the kth edge server |
ESk | The kth Edge server |