Authentication in Cloud Computing: Open Problems
Z Khudoykulov, A Karimov… - … on Electronics and …, 2023 - ieeexplore.ieee.org
An authentication mechanism plays an essential role in access control. Authentication
methods vary depending on the environment used, and many authentication methods are …
methods vary depending on the environment used, and many authentication methods are …
[HTML][HTML] Design of an E-Administration Platform and Its Cryptography-Based Security Model
O Omohwo, IG Babatunde, BO Kehinde… - Journal of Computer and …, 2023 - scirp.org
E-administration is performing administrative works via computer and its associated
technologies such as the Internet. It is administrative efforts that center on the exchange of …
technologies such as the Internet. It is administrative efforts that center on the exchange of …
[PDF][PDF] Securing Multi User Authentication in Cloud Computing Using Secret Sharing
S Patil - academia.edu
Cloud computing is a very much essential in various individual as well as business oriented
applications. Cloud computing provides very cost-effective, scalable and flexible solution to …
applications. Cloud computing provides very cost-effective, scalable and flexible solution to …