Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments
暂无分享,去创建一个
[1] IBRAHIM GHAFIR,et al. Botnet Command and Control Traffic Detection Challenges A Correlation based Solution , 2016 .
[2] Li Yang,et al. Entity authentication in a mobile-cloud environment , 2013, CSIIRW '13.
[3] Bamidele Adebisi,et al. Dynamic clustering and management of mobile wireless sensor networks , 2017, Comput. Networks.
[4] Pethuru Raj,et al. A proof of concept implementation of a mobile based authentication scheme without password table for cloud environment , 2015, 2015 IEEE International Advance Computing Conference (IACC).
[5] Mohammad Hammoudeh,et al. A Survey on Network Security Monitoring Systems , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[6] Young-Sik Jeong,et al. An efficient authentication system of smart device using multi factors in mobile cloud service architecture , 2015, Int. J. Commun. Syst..
[7] Timothy Grance,et al. Cloud Computing Synopsis and Recommendations , 2012 .
[8] Qiang Ye,et al. Message digest as authentication entity for mobile cloud computing , 2013, 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC).
[9] Sarah Mount,et al. Map as a Service: A Framework for Visualising and Maximising Information Return from Multi-Modal Wireless Sensor Networks , 2015, Sensors.
[10] Saudi Arabia. Securing Mobile Cloud Using Finger Print Authentication , 2013 .
[11] Bamidele Adebisi,et al. A Wireless Sensor Network Border Monitoring System: Deployment Issues and Routing Protocols , 2017, IEEE Sensors Journal.
[12] Jean-Marc Robert,et al. Security and usability: the case of the user authentication methods , 2006, IHM '06.
[13] Mohammad Hammoudeh,et al. Social Engineering Attack Strategies and Defence Approaches , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[14] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[15] Patrick Bours,et al. A Mobile Phone Device as a Biometrics Authentication Method for an ATM Terminal , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[16] Urs Hengartner,et al. Itus: an implicit authentication framework for android , 2014, MobiCom.
[17] Sebti Foufou,et al. Cloud-Ready Biometric System for Mobile Security Access , 2012, NDT.
[18] Ramlan Mahmod,et al. Design and implementation of multi factor mechanism for secure authentication system , 2013 .
[19] Paulo Lobato Correia,et al. Smartphone-based palmprint recognition system , 2014, 2014 21st International Conference on Telecommunications (ICT).