Because the authentication method based on username-password has the disadvantage of easy disclosure and low reliability and the excess password management degrades the user experience tremendously, the user is eager to get rid of the bond of the password in order to seek a new way of authentication. Therefore, the multifactor biometrics-based user authentication wins the favor of people with advantages of simplicity, convenience, and high reliability. Now the biometrics-based (especially the fingerprint information) authentication technology has been extremely mature, and it is universally applied in the scenario of the mobile payment. Unfortunately, in the existing scheme, biometric information is stored on the server side. As thus, once ...
Background: Information and communication technology development provides services to various fields...
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to impro...
Abstract- Security is something which cannot be comprised with, especially in cloud computing. Data ...
One of the popular challenges that faces the Cloud Computing is the authentication problem. Authenti...
Authenticating users and establishing their identity is the first most part of any computer based ap...
Mobile Cloud Computing (MCC) enables the resource-constrained Mobile Devices to host Mobile Applicat...
The Cloud has become a popular business transaction platform nowadays. Unfortunately, this powerful ...
The raise in the recent security incidents of cloud computing and its challenges is to secure the da...
Worldwide adoption of mobile products and cloud computing services not only continues, but is accele...
A multiserver environment can improve the efficiency of mobile network services more effectively tha...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile us...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
Mobile devices offer a convenient way of accessing our digital lives and many of those devices hold ...
Mobile devices offer a convenient way of accessing our digital lives and many of those devices hold ...
Background: Information and communication technology development provides services to various fields...
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to impro...
Abstract- Security is something which cannot be comprised with, especially in cloud computing. Data ...
One of the popular challenges that faces the Cloud Computing is the authentication problem. Authenti...
Authenticating users and establishing their identity is the first most part of any computer based ap...
Mobile Cloud Computing (MCC) enables the resource-constrained Mobile Devices to host Mobile Applicat...
The Cloud has become a popular business transaction platform nowadays. Unfortunately, this powerful ...
The raise in the recent security incidents of cloud computing and its challenges is to secure the da...
Worldwide adoption of mobile products and cloud computing services not only continues, but is accele...
A multiserver environment can improve the efficiency of mobile network services more effectively tha...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile us...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
Mobile devices offer a convenient way of accessing our digital lives and many of those devices hold ...
Mobile devices offer a convenient way of accessing our digital lives and many of those devices hold ...
Background: Information and communication technology development provides services to various fields...
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to impro...
Abstract- Security is something which cannot be comprised with, especially in cloud computing. Data ...