New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing.
E. MunivelA. KannammalPublished in: Secur. Commun. Networks (2019)
Keyphrases
- authentication scheme
- cloud computing
- secret key
- authentication protocol
- middleware architecture
- smart card
- key agreement
- password guessing
- user authentication
- data center
- data management
- security issues
- security analysis
- public key
- mobile devices
- diffie hellman
- cloud storage
- service providers
- key management
- cloud computing platform
- identity management
- encryption scheme
- security protocols
- lightweight
- ciphertext
- mobile users
- mobile applications
- private cloud
- secure manner
- encryption algorithm
- database
- rfid tags
- resource constrained
- mobile services
- sensitive data
- databases