Bhatia et al., 2017 - Google Patents
Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issuesBhatia et al., 2017
- Document ID
- 18182862796347036464
- Author
- Bhatia T
- Verma A
- Publication year
- Publication venue
- The Journal of Supercomputing
External Links
Snippet
The incessant spurt of research activities to augment capabilities of resource-constrained mobile devices by leveraging heterogeneous cloud resources has created a new research impetus called mobile cloud computing. However, this rapid relocation to the cloud has …
- 238000011160 research 0 title abstract description 27
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bhatia et al. | Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues | |
| Abdullah et al. | Blockchain based approach to enhance big data authentication in distributed environment | |
| Kaur et al. | A secure two‐factor authentication framework in cloud computing | |
| Kim et al. | A security analysis of blockchain-based did services | |
| Lu et al. | A biometrics and smart cards‐based authentication scheme for multi‐server environments | |
| Lim et al. | Security issues and future challenges of cloud service authentication | |
| Obert et al. | Recommendations for trust and encryption in DER interoperability standards | |
| CN108418691A (en) | SGX-based dynamic network identity authentication method | |
| Khattak et al. | A study on threat model for federated identities in federated identity management system | |
| Nimmy et al. | A novel multi-factor authentication protocol for smart home environments | |
| Quan et al. | A secure user authentication protocol for sensor network in data capturing | |
| KR20220038115A (en) | Systems and Methods for Biometric Protocol Standards | |
| Schwarz et al. | Feido: Recoverable FIDO2 tokens using electronic ids | |
| Idrissi et al. | Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems | |
| Khan et al. | A brief review on cloud computing authentication frameworks | |
| Singh | The Role of Multi-Factor Authentication and Encryption in Securing Data Access of Cloud Resources in a Multitenant Environment | |
| Wee et al. | Excavating vulnerabilities lurking in multi-factor authentication protocols: A systematic security analysis | |
| Vemulapalli et al. | Security frameworks in mobile cloud computing | |
| US20250021982A1 (en) | Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions | |
| CN106576050B (en) | Three-tier security and computing architecture | |
| Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
| Hasan et al. | Authentication techniques in cloud and mobile cloud computing | |
| Sudha et al. | A survey on different authentication schemes in cloud computing environment | |
| Kim et al. | Secure user authentication based on the trusted platform for mobile devices | |
| US8782752B1 (en) | Apparatus and method for multi-plane threshold security |