A privacy-aware authentication scheme for distributed mobile cloud computing services

JL Tsai, NW Lo - IEEE systems journal, 2015 - ieeexplore.ieee.org
In modern societies, the number of mobile users has dramatically risen in recent years. In
this paper, an efficient authentication scheme for distributed mobile cloud computing …

A comprehensive formal security analysis of OAuth 2.0

D Fett, R Küsters, G Schmitz - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on
(SSO) protocols and also serves as the foundation for the new SSO standard OpenID …

Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns

A Norta, R Matulevičius, B Leiding - Computers & Security, 2019 - Elsevier
Designing government independent and secure identification-and authentication protocols
is a challenging task. Design flaws and missing specifications as well as security-and …

On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services

S Roy, S Chatterjee, AK Das, S Chattopadhyay… - IEEE …, 2017 - ieeexplore.ieee.org
Secure and efficient lightweight user authentication protocol for mobile cloud computing
becomes a paramount concern due to the data sharing using Internet among the end users …

Discovering concrete attacks on website authorization by formal analysis

C Bansal, K Bhargavan… - Journal of Computer …, 2014 - content.iospress.com
Social sign-on and social sharing are becoming an ever more popular feature of web
applications. This success is largely due to the APIs and support offered by prominent social …

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services

V Odelu, AK Das, S Kumari, X Huang… - Future Generation …, 2017 - Elsevier
With the rapid development of mobile cloud computing, the security becomes a crucial part
of communication systems in a distributed mobile cloud computing environment. Recently, in …

The web sso standard openid connect: In-depth formal security analysis and security guidelines

D Fett, R Küsters, G Schmitz - 2017 IEEE 30th Computer …, 2017 - ieeexplore.ieee.org
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …

DecChain: A decentralized security approach in Edge Computing based on Blockchain

E Bonnah, J Shiguang - Future Generation Computer Systems, 2020 - Elsevier
Security in edge computing paradigms has become a major concern in recent times due to
the integral role it plays in the framework of edge computing. Privacy-preserving and data …

Encrypted token based authentication with adapted SAML technology for cloud web services

I Indu, RA PM, V Bhaskar - Journal of Network and Computer Applications, 2017 - Elsevier
Web applications and cloud services are rapidly emerging as the inevitable technology for
communication between organizations. Cloud-based solutions are currently deployed to …

Generating stable biometric keys for flexible cloud computing authentication using finger vein

Z Wu, L Tian, P Li, T Wu, M Jiang, C Wu - Information Sciences, 2018 - Elsevier
Cloud computing is profoundly changing the way of data storage, transfer and process. User
authentication is the first security barrier for cloud computing. However, the security of …