Authentication in mobile cloud computing: A survey

M Alizadeh, S Abolfazli, M Zamani, S Baharun… - Journal of Network and …, 2016 - Elsevier
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …

Secure SMS transmission based on social network messages

SS Chaeikar, S Yazdanpanah… - International Journal of …, 2021 - inderscienceonline.com
Nowadays, short message communication has a wide range of applications in modern lives.
Authentication, announcements, reports, and personal communications are the common …

Feasibility of implementing multi-factor authentication schemes in mobile cloud computing

M Alizadeh, WH Hassan… - 2014 5th International …, 2014 - ieeexplore.ieee.org
Mobile cloud computing is a new computing technology, which provides on-demand
resources. Nowadays, this computing paradigm is becoming one the most interesting …

[PDF][PDF] Identity theft methods and fraud types

A Tajpour, S Ibrahim, M Zamani - IJIPM: International Journal of …, 2013 - researchgate.net
Identity-based crimes are considered to be one of the most significant and growing problems
of the last 20 years due to the significant economic harm these offenses pose for victims …

[PDF][PDF] E-commerce and identity theft issues

A Tajpour, S Ibrahim, M Zamani - International Journal of …, 2013 - researchgate.net
Cyberspace is the digitized and networked work area people enter when using the Internet.
Electronic commerce depends on the use of personally identifiable information and …

Statistical steganalysis of four photo themes before embedding

AAJ Altaay, S bin Sahib… - … Conference on Advanced …, 2013 - ieeexplore.ieee.org
In order to analyze how the correlativity behavioral pattern would change after data
embedding, it needs to conduct a statistical analyze on average, maximum, minimum, and …

[PDF][PDF] Secure SMS Method Based on Social Networks

S Yazdanpanah, S Shojae Chaeikar - International Journal of …, 2016 - academia.edu
ABSTRACT Nowadays, Short Message Service (SMS) communications play important role
in daily lives. Authentication, reports and personal communications are the common …

Contemporary collaborative trends and their effect in education

C Douligeris, E Seralidou - 2017 IEEE Global Engineering …, 2017 - ieeexplore.ieee.org
Collaborative learning has become an increasingly popular method of engaging students in
the learning process. The activities included in this type of learning focus on the interaction …

Privacy Issues and Protection in Secure Data Outsourcing

T Khodadadi, AKMM Islam, S Baharun… - Jurnal …, 2014 - journals.utm.my
Utilizing database encryption to safeguard data in several conditions where access control
is not sufficient is unavoidable. Database encryption offers an extra layer of security to …

Tasks security scheduling based on DPSO in heterogeneous grid environment

D Zhang, H Zhu, Y Wang, Z Miao - 2010 Second International …, 2010 - ieeexplore.ieee.org
For the task scheduling problem in the heterogeneous grid environment, a security benefit
function is constructed by considering the task scheduling demand for confidentiality …