[go: up one dir, main page]

Abed, 2025 - Google Patents

The Techniques of authentication in the Context of Cloud Computing

Abed, 2025

View PDF
Document ID
5342233400821492653
Author
Abed A
Publication year
Publication venue
Int. J. Advanced Networking and Applications

External Links

Snippet

-------------------------------------------------------------------ABSTRACT------------------------------------------- --------------------One solution that helps with straightforward, on-demand access to a pool of reconfigurable computing resources is cloud computing. Cloud Computing is an emerging …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US11496310B2 (en) Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication
JP6941146B2 (en) Data security service
US11233637B2 (en) System and method for validating an entity
Lim et al. Blockchain technology the identity management and authentication service disruptor: a survey
US10735407B2 (en) System and method for temporary password management
Anakath et al. Privacy preserving multi factor authentication using trust management
US10601814B2 (en) System and method for temporary password management
US11388174B2 (en) System and method for securing a communication channel
CN107359998A (en) A kind of foundation of portable intelligent password management system and operating method
Albalawi et al. A survey on authentication techniques for the internet of things
CN113826096B (en) User authentication and signature device and method using user biometric identification data
Ghazizadeh et al. Trusted computing strengthens cloud authentication
CN114175079A (en) System and method for biometric protocol standard
Abed The Techniques of authentication in the Context of Cloud Computing
Sharma et al. Dual factor third‐party biometric‐based authentication scheme using quantum one time passwords
Khan et al. A brief review on cloud computing authentication frameworks
Praveen Kumar et al. A password less authentication protocol for multi-server environment using physical unclonable function
JP2010505334A (en) System and method for facilitating secure online transactions
Wu et al. A Blockchain‐Based Hierarchical Authentication Scheme for Multiserver Architecture
Gupta et al. Implementing high grade security in cloud application using multifactor authentication and cryptography
Ren et al. BIA: A blockchain-based identity authorization mechanism
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Krishna et al. SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier
Arya et al. An improved remote user verification scheme in wireless body area networks
Callant II Password-less two-factor authentication using scannable barcodes on a mobile device