Efficient Hierarchical Multi-Server Authentication Protocol For Mobile Cloud Computing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Authentication Scheme for Mobile Cloud Computing Services

The explosive growth of mobile users has been increasing in the past few years. In this paper, an efficient authentication scheme for distributed mobile cloud computing is proposed. This proposed scheme enables the users to access multiple service providers with a single private key. Instead of opting traditional public key cryptosystem like RSA, the proposed scheme uses bilinear pairing techni...

متن کامل

An Efficient Authentication Protocol Supporting Privacy in Mobile Computing Environments

The anticipated increase in mobility and popular use of the mobile services will require more technologies for authenticating mobile hosts and protecting their privacy. However, the issues such as privacy and confidentiality in mobile computing environments and the resource restriction of mobile hosts have not been given enough consideration. In this paper, we present an authentication protocol...

متن کامل

An efficient authentication protocol for mobile communications

In this paper, a new Global System of Mobile Communications (GSM) authentication protocol is proposed to improve some drawbacks of the current GSM authentication protocol for roaming users including: (a) communication overhead between VLR; (b) huge bandwidth consumption between VLR and HLR; (c) storage space overhead in VLR; (d) overloaded in HLR with authentication of mobile stations; and (e) ...

متن کامل

An Efficient Authentication Protocol for Mobile Networks

Many existing authentication protocols supporting inter-domain authentication on the Internet require their clients to communicate with every involved key distribution center (KDC) directly. This is inefficient and costly when the client side is a wireless mobile unit, for wireless transmission has relatively lower bandwidth, and a mobile unit is battery powered. In this paper, we present a mob...

متن کامل

A novel multi-server authentication protocol

Recently, Tsai and Hsiang et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, after our analysis, we found some security loopholes in each protocol. We will first show the attacks on their schemes and then present ours. After the security analysis, we conclude that our scheme is the most secure one amon...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, Materials & Continua

سال: 2020

ISSN: 1546-2226

DOI: 10.32604/cmc.2020.09758