Novel mutual authentication protocol for cloud computing using secret sharing and steganography.
K. NimmyM. SethumadhavanPublished in: ICADIWT (2014)
Keyphrases
- cloud computing
- secret sharing
- authentication protocol
- secret sharing scheme
- smart card
- security analysis
- encryption scheme
- public key
- lightweight
- multi party
- security protocols
- secret key
- data management
- rfid tags
- key management
- data hiding
- security issues
- information security
- database
- hash functions
- secret image
- databases