MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing
نویسندگان
چکیده
منابع مشابه
Advanced Secure User Authentication Framework for Cloud Computing
Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has gained increasing attention these years. Meanwhile it also faces many security challenges, one of which is authentication. Lots of researches have been done in this area. Recently, Choudhury et al proposed a user authentication framework to ensure user legitimacy before entering into the cloud. They claimed t...
متن کاملEfficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerable to information security. In this paper, we present two efficient and secure authentication protocols for mobile VoIP services. In our approaches, we first develop a secure authentication protocol for mobile IP regist...
متن کاملSecure Data Storage in Mobile Cloud Computing
In cloud computing highly scalable computing resources are supplied as an outer service through internet on pay-as-usability basis. Portio research [1] estimates that mobile subscribers will reach 6.5 billion by the end of 2012, 6.9 billion by the end of 2013. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which gave birth to Mobile Cloud Com...
متن کاملSecure Mobile Cloud Computing and Security Issues
The proliferation of mobile devices, coupled by the increase in their capabilities, have enabled the establishment of a rich mobile computing platform that can be utilized in conjunction with cloud services. In this chapter, we overview the latest mobile computing models and architectures focusing on their security properties. In particular, we study a wide range of threats against the availabi...
متن کاملQuantum-enhanced secure delegated classical computing
We present a family of quantumly-enhanced protocols to achieve unconditionally secure delegated classical computation where the client and the server have both their classical and quantum computing capacity limited. We prove the same task cannot be achieved using only classical protocols. This extends the work of Anders and Browne on the computational power of correlations to a security setting...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2016
ISSN: 1939-0114
DOI: 10.1002/sec.1490