A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Ruhul AminSK Hafizul IslamG. P. BiswasDebasis GiriMuhammad Khurram KhanNeeraj KumarPublished in: Secur. Commun. Networks (2016)
Keyphrases
- computing environments
- authentication scheme
- user authentication
- privacy aware
- computing platform
- mobile computing
- mobile agents
- trusted computing
- smart card
- authentication protocol
- public key
- personal information
- security analysis
- biometric systems
- secret key
- location information
- cloud computing
- key management
- information systems
- lightweight
- sensor networks
- multi agent