Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
We live in a digital world where every detail of our information is being transferred from one smart device to another via cross-platform, third-party cloud services. Smart technologies, such as, smartphones are playing dynamic roles in order to successfully complete our daily routines and official...
Main Authors: | Zeeshan Siddiqui, Omar Tayan, Muhammad Khurram Khan |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8374417/ |
Similar Items
-
ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING
by: Rui Jiang
Published: (2013-09-01) -
On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
by: Sandip Roy, et al.
Published: (2017-01-01) -
An Improved Two-Way Security Authentication Protocol for RFID System
by: Baolong Liu, et al.
Published: (2018-04-01) -
Robot Identification and Authentication in a Robot Cloud Service System
by: Chin-Ling Chen, et al.
Published: (2018-01-01) -
A distributed authentication architecture and protocol
by: Kristian Skračić, et al.
Published: (2017-01-01)