An Efficient Unique Tokenized Authentication Technique Based Data Offloading Approach Using Key Exchange to Maintain Data Integrity in Heterogeneous Networks
Abstract
References
Recommendations
Security proofs for an efficient password-based key exchange
CCS '03: Proceedings of the 10th ACM conference on Computer and communications securityPassword-based key exchange schemes are designed to provide entities communicating over a public network, and sharing a (short) password only, with a session key (e.g, the key is used for data integrity and/or confidentiality). The focus of the present ...
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Cloud data auditing is extremely essential for securing cloud storage since it enables cloud users to verify the integrity of their outsourced data efficiently. The computation overheads on both the cloud server and the verifier can be significantly ...
Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
With the rapid development of cloud computing, its security and privacy are of great concern. Since the cloud service provider is not completely trustworthy, the security of the outsourced files has become serious issues. Identity-based proxy re-...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in