Authentication in mobile cloud computing: A survey
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …
that incorporates multitude of heterogeneous cloud-based resources to augment …
Secure SMS transmission based on social network messages
SS Chaeikar, S Yazdanpanah… - International Journal of …, 2021 - inderscienceonline.com
Nowadays, short message communication has a wide range of applications in modern lives.
Authentication, announcements, reports, and personal communications are the common …
Authentication, announcements, reports, and personal communications are the common …
Feasibility of implementing multi-factor authentication schemes in mobile cloud computing
M Alizadeh, WH Hassan… - 2014 5th International …, 2014 - ieeexplore.ieee.org
Mobile cloud computing is a new computing technology, which provides on-demand
resources. Nowadays, this computing paradigm is becoming one the most interesting …
resources. Nowadays, this computing paradigm is becoming one the most interesting …
[PDF][PDF] Identity theft methods and fraud types
Identity-based crimes are considered to be one of the most significant and growing problems
of the last 20 years due to the significant economic harm these offenses pose for victims …
of the last 20 years due to the significant economic harm these offenses pose for victims …
[PDF][PDF] E-commerce and identity theft issues
Cyberspace is the digitized and networked work area people enter when using the Internet.
Electronic commerce depends on the use of personally identifiable information and …
Electronic commerce depends on the use of personally identifiable information and …
Statistical steganalysis of four photo themes before embedding
AAJ Altaay, S bin Sahib… - … Conference on Advanced …, 2013 - ieeexplore.ieee.org
In order to analyze how the correlativity behavioral pattern would change after data
embedding, it needs to conduct a statistical analyze on average, maximum, minimum, and …
embedding, it needs to conduct a statistical analyze on average, maximum, minimum, and …
[PDF][PDF] Secure SMS Method Based on Social Networks
S Yazdanpanah, S Shojae Chaeikar - International Journal of …, 2016 - academia.edu
ABSTRACT Nowadays, Short Message Service (SMS) communications play important role
in daily lives. Authentication, reports and personal communications are the common …
in daily lives. Authentication, reports and personal communications are the common …
Contemporary collaborative trends and their effect in education
C Douligeris, E Seralidou - 2017 IEEE Global Engineering …, 2017 - ieeexplore.ieee.org
Collaborative learning has become an increasingly popular method of engaging students in
the learning process. The activities included in this type of learning focus on the interaction …
the learning process. The activities included in this type of learning focus on the interaction …
Privacy Issues and Protection in Secure Data Outsourcing
T Khodadadi, AKMM Islam, S Baharun… - Jurnal …, 2014 - journals.utm.my
Utilizing database encryption to safeguard data in several conditions where access control
is not sufficient is unavoidable. Database encryption offers an extra layer of security to …
is not sufficient is unavoidable. Database encryption offers an extra layer of security to …
Tasks security scheduling based on DPSO in heterogeneous grid environment
D Zhang, H Zhu, Y Wang, Z Miao - 2010 Second International …, 2010 - ieeexplore.ieee.org
For the task scheduling problem in the heterogeneous grid environment, a security benefit
function is constructed by considering the task scheduling demand for confidentiality …
function is constructed by considering the task scheduling demand for confidentiality …