Computationally efficient and secure anonymous authentication scheme for cloud users
In cloud computing, the combinations of various computing units are globally separated, however, electronically connected. In recent years, the number of cloud users has adequately increased in the modern societies. In order to restrict the illegal access of the intruders, a strong user authenticati...
Saved in:
| Published in: | Personal and ubiquitous computing Vol. 28; no. 1; pp. 111 - 121 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
London
Springer London
01.02.2024
Springer Nature B.V |
| Subjects: | |
| ISSN: | 1617-4909, 1617-4917 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!