Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review
The fast growth of the cloud computing technology has led to immense development in the public and private sectors. Cloud computing provides a high level of virtualization, massive scalability, multitenancy and elasticity. This has enabled organizations, academia, government departments and the publ...
Saved in:
| Main Authors: | Syed Amma Sheik, Amutha Prabakar Muniyandi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
KeAi Communications Co., Ltd.
2023-12-01
|
| Series: | Cyber Security and Applications |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2772918422000029 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Efficient anonymous password-based authenticated key exchange scheme
by: TAN Shi-chong, et al.
Published: (2009-01-01) -
Mutual authentication scheme based on the TPM cloud computing platform
by: Zhen-peng LIU, et al.
Published: (2012-11-01) -
SECURE USER AUTHENTICATION IN THE CLOUD: LEVERAGING FACE RECOGNITION TECHNOLOGY
by: Yellamma Pachipala, et al.
Published: (2024-12-01) -
UCAP:a PCL secure user authentication protocol in cloud computing
by: Xuefeng LI, et al.
Published: (2018-08-01) -
Authentication scheme for multi-cloud environment based on smart card
by: Sen ZHAO, et al.
Published: (2018-04-01)