A privacy-aware authentication scheme for distributed mobile cloud computing services

JL Tsai, NW Lo - IEEE systems journal, 2015 - ieeexplore.ieee.org
In modern societies, the number of mobile users has dramatically risen in recent years. In
this paper, an efficient authentication scheme for distributed mobile cloud computing …

An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications

S Jegadeesan, M Azees, PM Kumar… - Sustainable Cities and …, 2019 - Elsevier
Nowadays, the number of mobile users has considerably increased in recent years. The
users can utilize several cloud computing services through their mobile devices during their …

Identity-based authentication for cloud computing

H Li, Y Dai, L Tian, H Yang - … CloudCom 2009, Bei**g, China, December 1 …, 2009 - Springer
Cloud computing is a recently developed new technology for complex systems with massive-
scale services sharing among numerous users. Therefore, authentication of both users and …

Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography

L Yan, C Rong, G Zhao - … , CloudCom 2009, Bei**g, China, December 1-4 …, 2009 - Springer
More and more companies begin to provide different kinds of cloud computing services for
Internet users at the same time these services also bring some security problems. Currently …

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services

V Odelu, AK Das, S Kumari, X Huang… - Future Generation …, 2017 - Elsevier
With the rapid development of mobile cloud computing, the security becomes a crucial part
of communication systems in a distributed mobile cloud computing environment. Recently, in …

Ensure hierarchal identity based data security in cloud environment

S Kaushik, C Gandhi - Research Anthology on Blockchain …, 2021 - igi-global.com
Cloud computing has emerged as a new promising field in the internet. It can be thought as
a new architecture for the next generation of IT enterprises. It allows the user to access …

Bidm: a blockchain-enabled cross-domain identity management system

R Chen, F Shu, S Huang, L Huang… - Journal of …, 2021 - ieeexplore.ieee.org
Reliable identity management and authentication are significant for network security. In
recent years, as traditional centralized identity management systems suffer from security and …

The strobe algorithms for multi-source warehouse consistency

Y Zhuge, H Garcia-Molina… - … Conference on Parallel …, 1996 - ieeexplore.ieee.org
A warehouse is a data repository containing integrated information for efficient querying and
analysis. Maintaining the consistency of warehouse data is challenging, especially if the …

An improved anonymous authentication scheme for distributed mobile cloud computing services

SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon - Cluster Computing, 2019 - Springer
Mobile cloud computing blend mobile and cloud computing together with the help of
wireless communication technology to achieve benefits for the stakeholders. These …

A secure authentication technique for connecting different IoT devices in the smart city infrastructure

R Sharma, R Arya - Cluster Computing, 2022 - Springer
Recently the IoT technology is widely used in the field of smart cities, smart banking, and
smart transportation system, etc. Various sensors can be installed in an open environment …