Keyphrases
- cloud computing
- authentication scheme
- internet services
- network access
- authentication protocol
- map reduce
- computing resources
- data center
- user authentication
- smart card
- middleware architecture
- data management
- service providers
- secret key
- cloud computing platform
- mobile devices
- cloud computing environment
- security issues
- mobile phone
- database
- mobile technologies
- mobile computing
- security analysis
- public key
- mobile agents
- wireless networks
- load balance
- information systems
- mobile terminals
- mobile applications
- low cost
- rfid tags