Login / Signup
Using Structural Diversity to Enforce Strong Authentication of Mobiles to the Cloud.
Samy Kambou
Ahmed Bouabdallah
Published in:
CNS (2019)
Keyphrases
</>
cloud computing
structural information
biometric authentication
identity management
database
real time
fragile watermarking
neural network
high level
lightweight
virtual machine
security requirements
global consistency
authentication scheme
identity authentication