Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service.
Yanrong LuDawei ZhaoPublished in: Comput. Commun. (2022)
Keyphrases
- cloud computing
- authentication scheme
- smart card
- user authentication
- service providers
- middleware architecture
- security analysis
- authentication protocol
- internet services
- network access
- cloud services
- computing resources
- private cloud
- data management
- data center
- cloud platform
- service level agreements
- cloud computing environment
- mobile services
- mobile devices
- secret key
- software as a service
- public key
- cloud computing platform
- security issues
- computing environments
- biometric systems
- information security
- mobile phone
- web services
- lightweight
- context aware
- security protocols
- mobile applications
- service oriented
- wireless networks
- rfid tags
- mobile computing
- low cost