Privacy and data protection in mobile cloud computing: A systematic mapping study

HM Alnajrani, AA Norman, BH Ahmed - Plos one, 2020 - journals.plos.org
As a result of a shift in the world of technology, the combination of ubiquitous mobile
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …

A new mutual authentication and key agreement protocol for mobile client—server environment

LD Tsobdjou, S Pierre… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile devices are becoming an essential part of many users' lives. Users exchange
sometimes very sensitive data with remote servers. This raises a security problem in terms of …

A secure biometric-based authentication protocol for global mobility networks in smart cities

M Ghahramani, R Javidan, M Shojafar - The Journal of supercomputing, 2020 - Springer
Smart city is an important concept in urban development. The use of information and
communication technology to promote quality of life and the management of natural …

Enhancing the access privacy of IDaaS system using SAML protocol in fog computing

C Rupa, R Patan, F Al-Turjman, L Mostarda - IEEE Access, 2020 - ieeexplore.ieee.org
Fog environment adoption rate is increasing day by day in the industry. Unauthorized
accessing of data occurs due to the preservation of Identity and information of the users …

An efficient and provably secure authenticated key agreement scheme for mobile edge computing

M Rakeei, F Moazami - Wireless Networks, 2022 - Springer
Abstract Though Mobile Cloud Computing (MCC) and Mobile Edge Computing (MEC)
technologies have brought more convenience to mobile services over past few years, but …

2PBDC: privacy-preserving bigdata collection in cloud environment

J Srinivas, AK Das, JJPC Rodrigues - The Journal of Supercomputing, 2020 - Springer
The combination of two overlapping technologies (bigdata and cloud computing) helps easy
access to the evolving applications. In this context, there is a serious requirement of …

Multi-factor authentication protocol based on electrocardiography signals for a mobile cloud computing environment

SL Albuquerque, CJ Miosso… - Mobile Computing …, 2023 - benthamdirect.com
Mobile Cloud Computing (MCC) is a highly complex topic that encompasses several
information security issues. The authentication area of the various entities involved has been …

A Novel High‐Efficiency Password Authentication and Key Agreement Protocol for Mobile Client‐Server

X Xu, Y Wang, XD Zhang… - Security and …, 2023 - Wiley Online Library
With the development of wireless technology, people increasingly rely on mobile devices.
Since most mobile devices transmit sensitive information via insecure public channels, it is …

Modèles de prévention et de détection des cyberattaques dans un environnement périphérique mobile/serveur

L Tsobdjou Dongmo - 2022 - publications.polymtl.ca
De nos jours, nous observons une prolifération des périphériques mobiles, tels que les
téléphones intelligents, les tablettes, les montres connectées et les capteurs corporels …

[PDF][PDF] A NOVEL FINGERPRINT MINUTIAE BASED AUTHENTICATION FRAMEWORK FOR CLOUD SERVICES

RR KALANGI, MCS RAO - Journal of Theoretical and Applied Information …, 2019 - jatit.org
Biometric based Authentication plays a vital role for signature verification and user access
control in the distributed cloud computing. Most of the traditional biometric based …