Safe box cloud authentication using TLS extesion.
Mounira MsahliMohamed Tahar HammiAhmed SerhrouchniPublished in: SSIC (2015)
Keyphrases
- cloud computing
- identity authentication
- identity management
- network access
- fragile watermarking
- security mechanisms
- user authentication
- authentication mechanism
- virtual machine
- data center
- security analysis
- biometric authentication
- authentication scheme
- signature verification
- data encryption
- keystroke dynamics
- computing platform
- parameter estimation
- low cost
- real time
- authentication protocol
- image authentication
- database
- wireless networks
- least squares
- data sets