Strong authentication for mobile cloud computing
暂无分享,去创建一个
[1] Indrajit Das. Mobile Security ( OTP ) by Cloud Computing , 2013 .
[2] Hanan AlShaher,et al. Securing Mobile Cloud Using Finger Print Authentication , 2013 .
[3] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[4] Erich M. Nahum,et al. Cryptographic strength of ssl/tls servers: current and recent practices , 2007, IMC '07.
[5] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[6] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[7] IehabALRassan,et al. Securing Mobile Cloud Using Finger Print Authentication , 2013 .
[8] Amel Bouzeghoub,et al. INCOME - Multi-scale Context Management for the Internet of Things , 2012, AmI.
[9] Steven Furnell. Computer insecurity - risking the system , 2005 .
[10] Jari Arkko,et al. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.