[go: up one dir, main page]

Bhatia et al., 2017 - Google Patents

Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues

Bhatia et al., 2017

Document ID
18182862796347036464
Author
Bhatia T
Verma A
Publication year
Publication venue
The Journal of Supercomputing

External Links

Snippet

The incessant spurt of research activities to augment capabilities of resource-constrained mobile devices by leveraging heterogeneous cloud resources has created a new research impetus called mobile cloud computing. However, this rapid relocation to the cloud has …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Bhatia et al. Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
Abdullah et al. Blockchain based approach to enhance big data authentication in distributed environment
Kaur et al. A secure two‐factor authentication framework in cloud computing
Kim et al. A security analysis of blockchain-based did services
Lu et al. A biometrics and smart cards‐based authentication scheme for multi‐server environments
Lim et al. Security issues and future challenges of cloud service authentication
Obert et al. Recommendations for trust and encryption in DER interoperability standards
CN108418691A (en) SGX-based dynamic network identity authentication method
Khattak et al. A study on threat model for federated identities in federated identity management system
Nimmy et al. A novel multi-factor authentication protocol for smart home environments
Quan et al. A secure user authentication protocol for sensor network in data capturing
KR20220038115A (en) Systems and Methods for Biometric Protocol Standards
Schwarz et al. Feido: Recoverable FIDO2 tokens using electronic ids
Idrissi et al. Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems
Khan et al. A brief review on cloud computing authentication frameworks
Singh The Role of Multi-Factor Authentication and Encryption in Securing Data Access of Cloud Resources in a Multitenant Environment
Wee et al. Excavating vulnerabilities lurking in multi-factor authentication protocols: A systematic security analysis
Vemulapalli et al. Security frameworks in mobile cloud computing
US20250021982A1 (en) Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions
CN106576050B (en) Three-tier security and computing architecture
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Hasan et al. Authentication techniques in cloud and mobile cloud computing
Sudha et al. A survey on different authentication schemes in cloud computing environment
Kim et al. Secure user authentication based on the trusted platform for mobile devices
US8782752B1 (en) Apparatus and method for multi-plane threshold security