Considerations for mobile authentication in the Cloud.
Zaheer AhmadKeith MayesSong DongKonstantinos MarkantonakisPublished in: Inf. Secur. Tech. Rep. (2011)
Keyphrases
- mobile phone
- mobile devices
- cloud computing
- mobile learning
- factor authentication
- mobile environments
- mobile commerce
- data center
- mobile networks
- mobile terminals
- identity authentication
- context aware
- virtual machine
- security mechanisms
- security analysis
- authentication scheme
- biometric authentication
- network access
- authentication systems