Bhatia et al., 2017 - Google Patents
Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issuesBhatia et al., 2017
- Document ID
- 18182862796347036464
- Author
- Bhatia T
- Verma A
- Publication year
- Publication venue
- The Journal of Supercomputing
External Links
Snippet
The incessant spurt of research activities to augment capabilities of resource-constrained mobile devices by leveraging heterogeneous cloud resources has created a new research impetus called mobile cloud computing. However, this rapid relocation to the cloud has …
- 238000011160 research 0 title abstract description 27
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhatia et al. | Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues | |
Abdullah et al. | Blockchain based approach to enhance big data authentication in distributed environment | |
Kaur et al. | A secure two‐factor authentication framework in cloud computing | |
Kim et al. | A security analysis of blockchain-based did services | |
Lu et al. | A biometrics and smart cards‐based authentication scheme for multi‐server environments | |
Lim et al. | Security issues and future challenges of cloud service authentication | |
Obert et al. | Recommendations for trust and encryption in DER interoperability standards | |
CN108418691A (en) | SGX-based dynamic network identity authentication method | |
Khattak et al. | A study on threat model for federated identities in federated identity management system | |
Nimmy et al. | A novel multi-factor authentication protocol for smart home environments | |
Quan et al. | A secure user authentication protocol for sensor network in data capturing | |
KR20220038115A (en) | Systems and Methods for Biometric Protocol Standards | |
Schwarz et al. | Feido: Recoverable FIDO2 tokens using electronic ids | |
Idrissi et al. | Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems | |
Khan et al. | A brief review on cloud computing authentication frameworks | |
Singh | The Role of Multi-Factor Authentication and Encryption in Securing Data Access of Cloud Resources in a Multitenant Environment | |
Wee et al. | Excavating vulnerabilities lurking in multi-factor authentication protocols: A systematic security analysis | |
Vemulapalli et al. | Security frameworks in mobile cloud computing | |
US20250021982A1 (en) | Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions | |
CN106576050B (en) | Three-tier security and computing architecture | |
Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
Hasan et al. | Authentication techniques in cloud and mobile cloud computing | |
Sudha et al. | A survey on different authentication schemes in cloud computing environment | |
Kim et al. | Secure user authentication based on the trusted platform for mobile devices | |
US8782752B1 (en) | Apparatus and method for multi-plane threshold security |