Computationally efficient and secure anonymous authentication scheme for cloud users

In cloud computing, the combinations of various computing units are globally separated, however, electronically connected. In recent years, the number of cloud users has adequately increased in the modern societies. In order to restrict the illegal access of the intruders, a strong user authenticati...

Full description

Saved in:
Bibliographic Details
Published in:Personal and ubiquitous computing Vol. 28; no. 1; pp. 111 - 121
Main Authors: Arasan, Anakath, Sadaiyandi, Rajakumar, Al-Turjman, Fadi, Rajasekaran, Arun Sekar, Selvi Karuppuswamy, Kalai
Format: Journal Article
Language:English
Published: London Springer London 01.02.2024
Springer Nature B.V
Subjects:
ISSN:1617-4909, 1617-4917
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first