2020
DOI: 10.1007/s11276-020-02368-2
|View full text |Cite
|
Sign up to set email alerts
|

Prediction-based secured handover authentication for mobile cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…These algorithms are further extended by the work in [12][13][14], wherein security-based models, fuzzy analytic hierarchy process, and secure handoff for mobile-based cloud deployments is proposed. These models assist in improving security during handoffs, thereby reducing attack probability, and increasing overall QoS of the heterogeneous network.…”
Section: Duementioning
confidence: 99%
“…These algorithms are further extended by the work in [12][13][14], wherein security-based models, fuzzy analytic hierarchy process, and secure handoff for mobile-based cloud deployments is proposed. These models assist in improving security during handoffs, thereby reducing attack probability, and increasing overall QoS of the heterogeneous network.…”
Section: Duementioning
confidence: 99%
“…For example, the semantics of audio signal may change fundamentally after a simple rearrangement or removal of a few small segments, which cannot be detected only by human auditory perception. Audio authentication technology is an effective technical means to protect the integrity and authenticity of music, voice, and other audio data [3]. It can ensure that the received audio data in the transmission process, without malicious editing and tampering by a third party, that is, in the sense of human perception system and the original audio, is exactly the same.…”
Section: Introductionmentioning
confidence: 99%