Recently, there are several studies have proposed user authentication frameworks to defend against different types of attacks such as phishing, replay attack, man in the middle attack and denial of service attack, etc. Most of these frameworks consist of three main phases, which are the registration phase, login phase, and authentication phase. Most of them have the changing password process as an additional activity.Many problemshave been noticed in the performance of these frameworks. For example, the registration phase is valunerable to internal attack such as SYN flood attack. In this work, we aim to propose a robust user authentication framework that overcomes the previous framework shortages. The proposed framework provides many secur...
With the popularity of cloud computing, information security issues in the cloud environment are bec...
AbstractIn recent years, there has been a growing interest in the cloud computing paradigm thanks to...
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance ...
Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has gained increa...
Abstract — Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has ga...
Together with the fast growth of networks and mobile devices, cloud computing has become one of the...
Cloud computing has an important aspect for the companies to build and deploy their infrastructure a...
To avail cloud services namely Software as a Service (SaaS), Platform as a Service (PaaS), Infrastru...
[[abstract]]In the cloud environments, the cloud user can use low computing devices to connect to th...
The demand for remote data storage and computation services is increasing exponentially in our data-...
Cloud Computing has attracted a lot of attention in both academia and industry lately. With its focu...
One of the popular challenges that faces the Cloud Computing is the authentication problem. Authenti...
Cloud-based services have become part of our day-to-day software solutions. The identity authenticat...
ABSTRACT: Cloud computing is an evolving computing paradigm that offers great potential to improve p...
Abstract: Clients that utilization distributed computing can browse a scope of offices. It offers se...
With the popularity of cloud computing, information security issues in the cloud environment are bec...
AbstractIn recent years, there has been a growing interest in the cloud computing paradigm thanks to...
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance ...
Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has gained increa...
Abstract — Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has ga...
Together with the fast growth of networks and mobile devices, cloud computing has become one of the...
Cloud computing has an important aspect for the companies to build and deploy their infrastructure a...
To avail cloud services namely Software as a Service (SaaS), Platform as a Service (PaaS), Infrastru...
[[abstract]]In the cloud environments, the cloud user can use low computing devices to connect to th...
The demand for remote data storage and computation services is increasing exponentially in our data-...
Cloud Computing has attracted a lot of attention in both academia and industry lately. With its focu...
One of the popular challenges that faces the Cloud Computing is the authentication problem. Authenti...
Cloud-based services have become part of our day-to-day software solutions. The identity authenticat...
ABSTRACT: Cloud computing is an evolving computing paradigm that offers great potential to improve p...
Abstract: Clients that utilization distributed computing can browse a scope of offices. It offers se...
With the popularity of cloud computing, information security issues in the cloud environment are bec...
AbstractIn recent years, there has been a growing interest in the cloud computing paradigm thanks to...
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance ...