A new mutual authentication and key agreement protocol for mobile client—server environment

LD Tsobdjou, S Pierre… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile devices are becoming an essential part of many users' lives. Users exchange
sometimes very sensitive data with remote servers. This raises a security problem in terms of …

An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services

L Xiong, F Li, M He, Z Liu, T Peng - IEEE Transactions on cloud …, 2020 - ieeexplore.ieee.org
In the last few years, mobile cloud computing (MCC) gains a huge development because of
the popularity of mobile applications and cloud computing. User authentication and access …

An Efficient Privacy-Preserving Access Control Scheme for Cloud Computing Services

L Xiong, JK Wang, L Yu, N Xiong… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
To meet the future system requirements of Cloud Computing Services (CCSs) for large
numbers of users, multiple services and high efficiency, authentication and access control …

面向移动云服务的分级访问控制的认证协议

王捷, 李晶, 罗影 - 应用科学学报, 2022 - jas.shu.edu.cn
针对移动云计算服务环境中终端设备资源有限的问题, 在现有支持分级访问的认证协议基础上,
基于签密技术和多服务器认证技术设计了一个高效的, 具有分级访问控制和隐私保护的认证协议 …

An Appointed Access Control Scheme for Distributed-Cloud Environment

Z Zhou, X Ling, F Xu, N XianHua… - IEEE INFOCOM 2023 …, 2023 - ieeexplore.ieee.org
With the development of cloud computing technology, single clouding services have not
been able to cope adequately with the online services boom, distributed-cloud is satisfied …

Modèles de prévention et de détection des cyberattaques dans un environnement périphérique mobile/serveur

L Tsobdjou Dongmo - 2022 - publications.polymtl.ca
De nos jours, nous observons une prolifération des périphériques mobiles, tels que les
téléphones intelligents, les tablettes, les montres connectées et les capteurs corporels …