Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing.
Ali A. YassinHai JinAyad IbrahimDeqing ZouPublished in: CGC (2012)
Keyphrases
- cloud computing
- authentication scheme
- digital signature
- smart card
- information security
- user authentication
- public key
- authentication protocol
- security issues
- security analysis
- security mechanisms
- secret key
- key management
- security requirements
- data management
- signature scheme
- network security
- databases
- peer to peer
- biometric systems
- data warehouse
- data sources
- database systems
- information systems