Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
The purpose of this project is to design and implement a framework that employs unique authentication method that relies on third party identification which is required to accurately identify and authenticate legitimate user in order to reduce the risk of disclosing confidential data to unauthorized...
| Main Authors: | Lim, Tsu Chean, Ponnusamy, Vasaki, Sulaiman, Mohamed Fati |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1183/ http://eprints.intimal.edu.my/1183/1/water-10-00998%20%281%29.pdf |
Similar Items
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
by: Mohammed, Hamdun, et al.
Published: (2017)
by: Mohammed, Hamdun, et al.
Published: (2017)
Privacy Concerns due to Class Elements in Cloud Environments despite Full Homomorphic Encryption
by: Jaber, Aws Naser, et al.
by: Jaber, Aws Naser, et al.
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Measurable bundles of *-homomorphisms C*-algebras
by: Ganiev, Inomjon, et al.
Published: (2012)
by: Ganiev, Inomjon, et al.
Published: (2012)
Multimedia encryption, transmission and authentication
Published: (2011)
Published: (2011)
A Bio-Inspired Framework for Wireless Sensor Network Using Mobile Sensors
by: Ponnusamy , Vasaki, et al.
Published: (2010)
by: Ponnusamy , Vasaki, et al.
Published: (2010)
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
Biologically-Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network
by: Vasaki , Ponnusamy, et al.
Published: (2010)
by: Vasaki , Ponnusamy, et al.
Published: (2010)
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008)
by: Ramamoorthy, Viknesh
Published: (2008)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019)
by: Eldow, Abdalla, et al.
Published: (2019)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
A Biologically Based Self-Healing Wireless Sensor Network
by: Ponnusamy , Vasaki, et al.
Published: (2010)
by: Ponnusamy , Vasaki, et al.
Published: (2010)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
by: Shamsudin, Ahmad Faizul, et al.
Published: (2010)
by: Shamsudin, Ahmad Faizul, et al.
Published: (2010)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Mobile Cloud Computing Solution for Visualization of Road Roughness
by: Lam, Chen Riang
Published: (2017)
by: Lam, Chen Riang
Published: (2017)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
by: Ejaz, Ahmed
Published: (2016)
by: Ejaz, Ahmed
Published: (2016)
Application of mobile cloud computing in emergency health care
by: Hameed, Shihab A., et al.
Published: (2019)
by: Hameed, Shihab A., et al.
Published: (2019)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
A lightweight heterogeneous hybrid mobile cloud computing framework for compute-intensive mobile applications / Zohreh Sanaei Moghaddam
by: Moghaddam, Zohreh Sanaei
Published: (2014)
by: Moghaddam, Zohreh Sanaei
Published: (2014)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
A lightweight framework for intensive mobile application processing in mobile cloud computing / Muhammad Shiraz
by: Muhammad , Shiraz
Published: (2013)
by: Muhammad , Shiraz
Published: (2013)
A lightweight identity-based Rivest-Shamir-Adleman authentication scheme for mobile ad hoc networks
by: Eissa, Tameem
Published: (2011)
by: Eissa, Tameem
Published: (2011)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Bandwith conservation framework for mobile cloud computing: challenges and solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Improving computational complexity using I-zag for text image authentication scheme
by: ‘Aqilah, Abd. Ghani
Published: (2024)
by: ‘Aqilah, Abd. Ghani
Published: (2024)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
by: Khan, Abdul Nasir
Published: (2014)
by: Khan, Abdul Nasir
Published: (2014)
Similar Items
-
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022) -
A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
by: Mohammed, Hamdun, et al.
Published: (2017) -
Privacy Concerns due to Class Elements in Cloud Environments despite Full Homomorphic Encryption
by: Jaber, Aws Naser, et al. -
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021) -
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)