2016 13th International Conference on New Technologies for Distributed Systems (NOTERE) 2016
DOI: 10.1109/notere.2016.7745824
|View full text |Cite
|
Sign up to set email alerts
|

Strong authentication for mobile cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…When a request comes from any user, the server verifies the client URI first. If the user URI is correct, then only the server accepts the request for impersonation and masquerade attack [10].…”
Section: Security Analysis and Verificationmentioning
confidence: 99%
See 2 more Smart Citations
“…When a request comes from any user, the server verifies the client URI first. If the user URI is correct, then only the server accepts the request for impersonation and masquerade attack [10].…”
Section: Security Analysis and Verificationmentioning
confidence: 99%
“…Related Work. Authentication is an essential security service in any system or network communications [8][9][10]. It is classified as user authentication, remote authentication, mutual authentication, message authentication, and implicit authentication [11,12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Their proposal provides mutual authentication, authorization, confidentiality, identity and access management, forward secrecy, anonymity, availability and it is secured against all types of attacks. [59] proposes an authentication mechanism for cloud-mobile system. They propose two solutions:…”
Section: Authentication and Key Management Solutionsmentioning
confidence: 99%