Return to Article Details A Powerful Three-Party Identification and Secret Negotiation Mechanism for Portable Computation Offloading IoT Device Security Protection Download Download PDF