A provable and secure mobile user authentication scheme for mobile cloud computing services.
Azeem IrshadShehzad Ashraf ChaudhryMuhammad ShafiqMuhammad UsmanMuhammad AsifAnwar GhaniPublished in: Int. J. Commun. Syst. (2019)
Keyphrases
- authentication scheme
- cloud computing
- mobile users
- mobile networks
- mobile environments
- mobile services
- service providers
- mobile applications
- context aware
- mobile phone
- mobile devices
- mobile computing
- private cloud
- smart card
- cloud services
- internet services
- middleware architecture
- location dependent
- data center
- user authentication
- data management
- internet access
- secret key
- public key
- mobile technologies
- mobile agents
- security issues
- multimedia services
- authentication protocol
- location aware
- smart phones
- security analysis
- m learning
- ubiquitous computing
- mobility management
- mobile objects
- information sources
- web services
- lightweight
- wireless technologies
- software as a service
- security mechanisms
- mobile nodes
- query processing
- end users
- hash functions
- ad hoc networks