2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin) 2011
DOI: 10.1109/icce-berlin.2011.6031855
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of authentication protocols for next-generation mobile and CE cloud services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 14 publications
0
21
0
Order By: Relevance
“…We all know that a binary tree, whose height is ℎ, has at most 2 ℎ − 1 nodes and the 0-degree nodes (which are leaf nodes) are 1 more than the 2-degree nodes (which are internal nodes having both left and right child nodes). Hence, we can get two observations: (1) has at most 2 ⌈log 2 ⌉ − 1 nodes.…”
Section: Definition 1 One Assumes Thatmentioning
confidence: 99%
See 1 more Smart Citation
“…We all know that a binary tree, whose height is ℎ, has at most 2 ℎ − 1 nodes and the 0-degree nodes (which are leaf nodes) are 1 more than the 2-degree nodes (which are internal nodes having both left and right child nodes). Hence, we can get two observations: (1) has at most 2 ⌈log 2 ⌉ − 1 nodes.…”
Section: Definition 1 One Assumes Thatmentioning
confidence: 99%
“…However, DOs cannot directly control their data placed in remote cloud servers, which may cause concerns about their outsourced data being illegally acquired or abused by the cloud service providers (CSPs), especially for the privacy-sensitive data, such as medical records, government documents, and emails. Although many CSPs claim that their cloud services have several security countermeasures, such as access control, firewall and intrusion detection, doubts about the security, and privacy of outsourced data that are still the main obstructions to the wider development of cloud computing [1].…”
Section: Introductionmentioning
confidence: 99%
“…Here, the bottom region of the display is modified to sense latent fingerprints so that the swiping operation captures the finger biometric data that are used to validate the user. a simple, yet secure and robust, authentication can be achieved using a trusted third party (TTP) architecture combined with zero knowledge proof (ZKP) techniques [12]. Thus, the extracted biometric feature(s) are protected by ZKP, and the transactions are verified via wellknown TTP techniques.…”
Section: Real-money Transactionsmentioning
confidence: 99%
“…Grzonkowski et al, [45] proposed an enhanced authentication scheme using Zero Knowledge Proof technique is presented in their papers to protect from phishing attack and to protect the user's password to the visiting websites. It also ensures that the users are not redirected to another web page after login to the corresponding one.…”
Section: Related Workmentioning
confidence: 99%