Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols.
Zeeshan SiddiquiOmar TayanMuhammad Khurram KhanPublished in: IEEE Access (2018)
Keyphrases
- cloud computing
- security analysis
- authentication protocol
- mutual authentication
- security properties
- user authentication
- public key
- smart card
- security requirements
- data management
- service providers
- key distribution
- mobile devices
- authentication scheme
- encryption scheme
- cryptographic protocols
- security issues
- encryption algorithm
- identity management
- data privacy
- information systems
- privacy protection
- database systems