Login / Signup
Bi-level user authentication for enriching legitimates and eradicating duplicates in cloud infrastructure.
R. Thandeeswaran
M. A. Saleem Durai
Published in:
Int. J. Comput. Aided Eng. Technol. (2020)
Keyphrases
</>
bi level
user authentication
cloud computing
data center
gray scale
information security
cloud services
security analysis
keystroke dynamics
biometric systems
authentication protocol
image compression
service providers
information systems
data mining
smart card
computer systems
computing resources
low cost
database