An ID-Based User Authentication Scheme for Cloud Computing.
Jen-Ho YangPei-Yu LinPublished in: IIH-MSP (2014)
Keyphrases
- cloud computing
- authentication scheme
- user authentication
- computing resources
- cloud computing environment
- public key
- data management
- data center
- service providers
- smart card
- security issues
- cloud computing platform
- secret key
- security analysis
- user experience
- key agreement
- end users
- databases
- authentication protocol
- data access
- data mining techniques
- private cloud