Login / Signup
Two-factor authentication for trusted third party free dispersed storage.
Ertem Esiner
Anwitaman Datta
Published in:
Future Gener. Comput. Syst. (2019)
Keyphrases
</>
trusted third party
factor authentication
third party
credit card
privacy protection
data storage
digital signature
mobile terminals
data mining
data management
database
data warehouse
authentication protocol