A privacy-aware authentication scheme for distributed mobile cloud computing services
JL Tsai, NW Lo - IEEE systems journal, 2015 - ieeexplore.ieee.org
In modern societies, the number of mobile users has dramatically risen in recent years. In
this paper, an efficient authentication scheme for distributed mobile cloud computing …
this paper, an efficient authentication scheme for distributed mobile cloud computing …
An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications
Nowadays, the number of mobile users has considerably increased in recent years. The
users can utilize several cloud computing services through their mobile devices during their …
users can utilize several cloud computing services through their mobile devices during their …
Identity-based authentication for cloud computing
Cloud computing is a recently developed new technology for complex systems with massive-
scale services sharing among numerous users. Therefore, authentication of both users and …
scale services sharing among numerous users. Therefore, authentication of both users and …
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
More and more companies begin to provide different kinds of cloud computing services for
Internet users at the same time these services also bring some security problems. Currently …
Internet users at the same time these services also bring some security problems. Currently …
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
With the rapid development of mobile cloud computing, the security becomes a crucial part
of communication systems in a distributed mobile cloud computing environment. Recently, in …
of communication systems in a distributed mobile cloud computing environment. Recently, in …
Ensure hierarchal identity based data security in cloud environment
Cloud computing has emerged as a new promising field in the internet. It can be thought as
a new architecture for the next generation of IT enterprises. It allows the user to access …
a new architecture for the next generation of IT enterprises. It allows the user to access …
Bidm: a blockchain-enabled cross-domain identity management system
Reliable identity management and authentication are significant for network security. In
recent years, as traditional centralized identity management systems suffer from security and …
recent years, as traditional centralized identity management systems suffer from security and …
The strobe algorithms for multi-source warehouse consistency
Y Zhuge, H Garcia-Molina… - … Conference on Parallel …, 1996 - ieeexplore.ieee.org
A warehouse is a data repository containing integrated information for efficient querying and
analysis. Maintaining the consistency of warehouse data is challenging, especially if the …
analysis. Maintaining the consistency of warehouse data is challenging, especially if the …
An improved anonymous authentication scheme for distributed mobile cloud computing services
Mobile cloud computing blend mobile and cloud computing together with the help of
wireless communication technology to achieve benefits for the stakeholders. These …
wireless communication technology to achieve benefits for the stakeholders. These …
A secure authentication technique for connecting different IoT devices in the smart city infrastructure
R Sharma, R Arya - Cluster Computing, 2022 - Springer
Recently the IoT technology is widely used in the field of smart cities, smart banking, and
smart transportation system, etc. Various sensors can be installed in an open environment …
smart transportation system, etc. Various sensors can be installed in an open environment …