Login / Signup
Exploiting Group Signature to Implement User Authentication in Cloud Computing.
Sai Ji
Dengzhi Liu
Jian Shen
Published in:
CSA/CUTE (2016)
Keyphrases
</>
cloud computing
user authentication
data center
data management
cloud computing environment
security analysis
authentication protocol
group signature scheme
information security
security issues
biometric systems
cloud computing platform
low cost
databases