A privacy-aware authentication scheme for distributed mobile cloud computing services
JL Tsai, NW Lo - IEEE systems journal, 2015 - ieeexplore.ieee.org
In modern societies, the number of mobile users has dramatically risen in recent years. In
this paper, an efficient authentication scheme for distributed mobile cloud computing …
this paper, an efficient authentication scheme for distributed mobile cloud computing …
A comprehensive formal security analysis of OAuth 2.0
The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on
(SSO) protocols and also serves as the foundation for the new SSO standard OpenID …
(SSO) protocols and also serves as the foundation for the new SSO standard OpenID …
Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns
Designing government independent and secure identification-and authentication protocols
is a challenging task. Design flaws and missing specifications as well as security-and …
is a challenging task. Design flaws and missing specifications as well as security-and …
On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services
Secure and efficient lightweight user authentication protocol for mobile cloud computing
becomes a paramount concern due to the data sharing using Internet among the end users …
becomes a paramount concern due to the data sharing using Internet among the end users …
Discovering concrete attacks on website authorization by formal analysis
Social sign-on and social sharing are becoming an ever more popular feature of web
applications. This success is largely due to the APIs and support offered by prominent social …
applications. This success is largely due to the APIs and support offered by prominent social …
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
With the rapid development of mobile cloud computing, the security becomes a crucial part
of communication systems in a distributed mobile cloud computing environment. Recently, in …
of communication systems in a distributed mobile cloud computing environment. Recently, in …
The web sso standard openid connect: In-depth formal security analysis and security guidelines
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …
DecChain: A decentralized security approach in Edge Computing based on Blockchain
E Bonnah, J Shiguang - Future Generation Computer Systems, 2020 - Elsevier
Security in edge computing paradigms has become a major concern in recent times due to
the integral role it plays in the framework of edge computing. Privacy-preserving and data …
the integral role it plays in the framework of edge computing. Privacy-preserving and data …
Encrypted token based authentication with adapted SAML technology for cloud web services
Web applications and cloud services are rapidly emerging as the inevitable technology for
communication between organizations. Cloud-based solutions are currently deployed to …
communication between organizations. Cloud-based solutions are currently deployed to …
Generating stable biometric keys for flexible cloud computing authentication using finger vein
Z Wu, L Tian, P Li, T Wu, M Jiang, C Wu - Information Sciences, 2018 - Elsevier
Cloud computing is profoundly changing the way of data storage, transfer and process. User
authentication is the first security barrier for cloud computing. However, the security of …
authentication is the first security barrier for cloud computing. However, the security of …