Authentication in the clouds: a framework and its application to mobile users

R Chow, M Jakobsson, R Masuoka, J Molina… - Proceedings of the …, 2010 - dl.acm.org
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints
and practical computational and power limitations, which must be respected by mobile …

[PDF][PDF] Authentication in the Clouds: A Framework and its Application to Mobile Users

R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu… - 2010 - cs.umd.edu
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints
and practical computational and power limitations, which must be respected by mobile …

[PDF][PDF] Authentication in the Clouds: A Framework and its Application to Mobile Users

R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu… - 2010 - cgis.cs.umd.edu
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints
and practical computational and power limitations, which must be respected by mobile …

[PDF][PDF] Authentication in the Clouds: A Framework and its Application to Mobile Users

R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu… - 2010 - elaineshi.com
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints
and practical computational and power limitations, which must be respected by mobile …

[PDF][PDF] Authentication in the Clouds: A Framework and its Application to Mobile Users

R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu… - 2010 - academia.edu
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints
and practical computational and power limitations, which must be respected by mobile …

[PDF][PDF] Authentication in the Clouds: A Framework and its Application to Mobile Users

R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu… - 2010 - markus-jakobsson.com
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints
and practical computational and power limitations, which must be respected by mobile …

[PDF][PDF] Authentication in the Clouds: A Framework and its Application to Mobile Users

R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu… - 2010 - Citeseer
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints
and practical computational and power limitations, which must be respected by mobile …

[PDF][PDF] Authentication in the Clouds: A Framework and its Application to Mobile Users

R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu… - 2010 - researchgate.net
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints
and practical computational and power limitations, which must be respected by mobile …

[PDF][PDF] Authentication in the Clouds: A Framework and its Application to Mobile Users

R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu… - 2010 - cvs.cs.umd.edu
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints
and practical computational and power limitations, which must be respected by mobile …

[PDF][PDF] Authentication in the Clouds: A Framework and its Application to Mobile Users

R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu… - 2010 - elaineshi.com
Cloud computing is a natural fit for mobile security. Typical handsets have input constraints
and practical computational and power limitations, which must be respected by mobile …