Abed, 2025 - Google Patents
The Techniques of authentication in the Context of Cloud ComputingAbed, 2025
View PDF- Document ID
- 5342233400821492653
- Author
- Abed A
- Publication year
- Publication venue
- Int. J. Advanced Networking and Applications
External Links
Snippet
-------------------------------------------------------------------ABSTRACT------------------------------------------- --------------------One solution that helps with straightforward, on-demand access to a pool of reconfigurable computing resources is cloud computing. Cloud Computing is an emerging …
- 238000000034 method 0 title abstract description 47
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11496310B2 (en) | Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication | |
JP6941146B2 (en) | Data security service | |
US11233637B2 (en) | System and method for validating an entity | |
Lim et al. | Blockchain technology the identity management and authentication service disruptor: a survey | |
US10735407B2 (en) | System and method for temporary password management | |
Anakath et al. | Privacy preserving multi factor authentication using trust management | |
US10601814B2 (en) | System and method for temporary password management | |
US11388174B2 (en) | System and method for securing a communication channel | |
CN107359998A (en) | A kind of foundation of portable intelligent password management system and operating method | |
Albalawi et al. | A survey on authentication techniques for the internet of things | |
CN113826096B (en) | User authentication and signature device and method using user biometric identification data | |
Ghazizadeh et al. | Trusted computing strengthens cloud authentication | |
CN114175079A (en) | System and method for biometric protocol standard | |
Abed | The Techniques of authentication in the Context of Cloud Computing | |
Sharma et al. | Dual factor third‐party biometric‐based authentication scheme using quantum one time passwords | |
Khan et al. | A brief review on cloud computing authentication frameworks | |
Praveen Kumar et al. | A password less authentication protocol for multi-server environment using physical unclonable function | |
JP2010505334A (en) | System and method for facilitating secure online transactions | |
Wu et al. | A Blockchain‐Based Hierarchical Authentication Scheme for Multiserver Architecture | |
Gupta et al. | Implementing high grade security in cloud application using multifactor authentication and cryptography | |
Ren et al. | BIA: A blockchain-based identity authorization mechanism | |
Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
Krishna et al. | SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier | |
Arya et al. | An improved remote user verification scheme in wireless body area networks | |
Callant II | Password-less two-factor authentication using scannable barcodes on a mobile device |