Mobile cloud computing models security issues: A systematic review

AS AlAhmad, H Kahtan, YI Alzoubi, O Ali… - Journal of Network and …, 2021 - Elsevier
Mobile cloud computing (MCC) is a trending technology employed in several domains to
overcome the limitations of mobile devices by using cloud capabilities. Communication …

[HTML][HTML] Privacy and data protection in mobile cloud computing: A systematic mapping study

HM Alnajrani, AA Norman, BH Ahmed - Plos one, 2020 - journals.plos.org
As a result of a shift in the world of technology, the combination of ubiquitous mobile
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …

A complete user authentication and key agreement scheme using cancelable biometrics and PUF in multi-server environment

H Zhang, W Bian, B Jie, D Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the current development and popularization of biometrics recognition technology, our
biometrics and other identity information may be illegal bulk scalping, and there is the …

Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication

M Rusdan, M Sabar - Journal of Information …, 2020 - jurnal.stmik-amikbandung.ac.id
Jaringan wireless merupakan salah satu alternatif terbaik dalam membangun jaringan
komputer yang praktis dan fleksibel serta memiliki mobilitas tinggi. Sebagian besar institusi …

Layers based optimal privacy preservation of the on-premise data supported by the dual authentication and lightweight on fly encryption in cloud ecosystem

NP Hemanth Kumar, S Prabhudeva - Wireless Personal Communications, 2021 - Springer
Abstract The Big Data stored in the cloud-based clusters of nodes requires an efficient
mechanism to protect its privacy information. The traditional anonymization approach for …

Dynamic multi-factor authentication for smartphone

A Yohan, NW Lo, HR Lie - 2016 IEEE 27th Annual International …, 2016 - ieeexplore.ieee.org
Nowadays, smartphone has become a vital tool for both productivity and entertainment that
most people can't live without it. Due to the widespread usage of smartphone for both …

Multifactor Biometric Authentication for Cloud Computing Security

D More, B Deore, S Bhosale - Proceedings of International Conference on …, 2022 - Springer
Cloud services offer major advantage of the privacy of outsourced data. To alleviate this
problem, sensitive data needs to be transmitted in encrypted form. The proposed scheme …

[PDF][PDF] Authentication techniques in cloud and mobile cloud computing

M Hasan, MH Riaz, MA Rahman - International Journal of …, 2017 - researchgate.net
A major challenge in cloud and mobile cloud computing is to ensure security and privacy of
user's personal information (eg, financial data, health record, location information) from …

[PDF][PDF] Multifactor authentication for software protection

AJ Abboud - Diyala Journal of Engineering Sciences, 2015 - iasj.net
Software protection is a mechanism to make software systems more difficult (or impossible)
to be accessed by attackers. Such mechanisms are gaining more importance nowadays for …

Fast Two-Factor Authentication Method in Systems With a Centralized User's Database

B Rezanov, H Kuchuk - 2022 IEEE 3rd KhPI Week on …, 2022 - ieeexplore.ieee.org
work proposes a two-factor authentication method by integrating the second factor into the
authentication service in system with a centralized user's database. This approach made it …