A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing

Y Zhang, L Xiong, F Li, X Niu, H Wu - Journal of Systems Architecture, 2023 - Elsevier
Blockchain-based authentication mode, a fundamental solution to prevent unauthorized
access behavior, gradually becomes a focus in future distributed mobile cloud computing …

An efficient and secure delegated multi-authentication protocol for mobile data owners in cloud

L Wei, L Zhang, K Zhang, M Dong - … , WASA 2015, Qufu, China, August 10 …, 2015 - Springer
Due to plenty of cloud-based applications emerging and booming recently, data owners
always store their data in cloud and share them to data consumers through cloud servers …

[PDF][PDF] A lightweight authentication scheme for mobile cloud computing

MR Momeni - International Journal of Computer Science and …, 2014 - academia.edu
The ABI Research believes that the number of mobile cloud computing users is expected to
grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total …

D-FAP: dual-factor authentication protocol for mobile cloud connected devices

A Abuarqoub - Journal of Sensor and Actuator Networks, 2019 - mdpi.com
Emerging Mobile Cloud Computing (MCC) technologies offer a new world of promise by
leveraging the quality of mobile services. With MCC, resource-constrained mobile devices …

[PDF][PDF] Merging multi cloud deployment with multi bank payment with security

V Raja, S Rajasekar - International Journal of Emerging Technology in …, 2019 - ijetcse.com
The main aim of this Computer science engineering project is to computerize the bank
process, which is used to reduce the customer transaction time as well as user can able to …

A new secure authentication scheme for cloud computing environment

S Namasudra, P Roy - Concurrency and Computation: Practice …, 2017 - Wiley Online Library
Cloud computing is an emerging computing area that allows on‐demand, scalable, flexible,
and low‐cost services to the users. In cloud computing, access control and security are two …

[PDF][PDF] Authenticated key agreement based on NFC for mobile payment

B Seo, SW Lee, H Kim - International Journal of Computer and …, 2016 - researchgate.net
Mobile payment is being adopted all over the world in different ways. Along with the
increased convenience at the point of sale, mobile payment acceptance can also bring new …

A secured transaction based on blockchain architecture in mobile banking platform

JB Awotunde, C Chakraborty… - International Journal of …, 2022 - inderscienceonline.com
Blockchain technology makes the transfer of money possible and makes transactions
electronically easier and safer than the conventional payment system. Its common …

A 3-level multifactor Authentication scheme for cloud computing

C Singh, D Singh - International Journal of Computer …, 2019 - papers.ssrn.com
The objective of this paper is to propose a secure, user friendly and economical multi-level
authentication scheme that uses multiple factors for gaining access to resource on insecure …

[引用][C] Efficient protocol of secure mobile payment

L Xi, HH Ping - Journal of Communication and Computer, 2007