Login / Signup
Revisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing.
Yaosheng Shen
Ding Wang
Ping Wang
Published in:
ICCCS (2) (2018)
Keyphrases
</>
cloud computing
factor authentication
trusted computing
computing resources
data management
distributed computing
data center
cloud computing environment
service providers
computing platform
peer to peer
security issues
cloud services
cloud computing platform