An ID-Based Anonymous Authentication Scheme for Distributed Mobile Cloud Computing.
Tianyi ZhangFengtong WenPublished in: GRMSE (2) (2016)
Keyphrases
- cloud computing
- authentication scheme
- distributed computing
- cloud computing environment
- public key
- computing resources
- computing platform
- map reduce
- commodity hardware
- middleware architecture
- computing infrastructure
- data management
- peer to peer
- smart card
- data center
- user authentication
- secret key
- service providers
- cloud computing platform
- security analysis
- mobile devices
- security issues
- computing environments
- distributed environment
- distributed systems
- mobile computing
- grid computing
- mobile applications
- signature scheme
- virtual machine
- computer networks
- load balance
- operating system
- lightweight
- computer systems
- databases