2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC) 2016
DOI: 10.1109/icgtspicc.2016.7955289
|View full text |Cite
|
Sign up to set email alerts
|

Authentication scheme for insecure networks in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Al-Attab, B. S., & Fadewar, H. S. [19] proposed an authentication framework that can handle several types of attacks such as a denial of service (DOS), password guessing, replay, man-in-the-middle, insider attacks and so on. They argue that their framework built under coherent techniques such as hash function, USB token, and Diffie-Hellman.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Al-Attab, B. S., & Fadewar, H. S. [19] proposed an authentication framework that can handle several types of attacks such as a denial of service (DOS), password guessing, replay, man-in-the-middle, insider attacks and so on. They argue that their framework built under coherent techniques such as hash function, USB token, and Diffie-Hellman.…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to [14], there is no clear standard or technique to test the authentication property under the concept of a framework. We use the same evaluation technique that has been used in [19], where they used a security analysis that contains two-steps. The first one is functionality requirements, which define the main function or property that used to defend against several types of attacks.…”
Section: Evaluation and Security Analysismentioning
confidence: 99%
“…In [33], authors also used two-factor authentication. The first is also a password (knowledge factor) but the second is a USB token (possession factor).…”
Section: Authenticationmentioning
confidence: 99%