메뉴 건너뛰기




Volumn 61, Issue , 2016, Pages 59-80

Authentication in mobile cloud computing: A survey

Author keywords

Authentication; Cloud computing; Mobile cloud computing; Security

Indexed keywords

AUTHENTICATION; CLOUD COMPUTING; DISTRIBUTED COMPUTER SYSTEMS; ENERGY UTILIZATION; IMAGE PROCESSING; MOBILE DEVICES; THREE DIMENSIONAL COMPUTER GRAPHICS;

EID: 84948845626     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2015.10.005     Document Type: Review
Times cited : (140)

References (160)
  • 1
    • 84869193534 scopus 로고    scopus 로고
    • MOMCC: Market-oriented architecture for mobile cloud computing based on service oriented architecture
    • Beijing, China: IEEE Computer Society
    • Abolfazli S, Sanaei Z, Shiraz M, Gani A. MOMCC: market-oriented architecture for mobile cloud computing based on service oriented architecture. In: 1st IEEE international conference on communications in china workshops. Beijing, China: IEEE Computer Society; 2012. p. 8-13. doi: http://dx.doi.org/10.1109/ICCCW.2012.6316481.
    • (2012) 1st IEEE International Conference on Communications in China Workshops , pp. 8-113
    • Abolfazli, S.1    Sanaei, Z.2    Shiraz, M.3    Gani, A.4
  • 3
    • 84894646273 scopus 로고    scopus 로고
    • Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges
    • S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges IEEE Commun Surv Tutor 16 1 2014 337 368 10.1109/SURV.2013.070813.00285
    • (2014) IEEE Commun Surv Tutor , vol.16 , Issue.1 , pp. 337-368
    • Abolfazli, S.1    Sanaei, Z.2    Ahmed, E.3    Gani, A.4    Buyya, R.5
  • 4
    • 84896313884 scopus 로고    scopus 로고
    • Rich mobile applications: Genesis, taxonomy, and open issues
    • S. Abolfazli, Z. Sanaei, A. Gani, F. Xia, and L.T. Yang Rich mobile applications: genesis, taxonomy, and open issues J Netw Comput Appl 40 April 2014 345 362 10.1016/j.jnca.2013.09.009
    • (2014) J Netw Comput Appl , vol.40 , Issue.April , pp. 345-362
    • Abolfazli, S.1    Sanaei, Z.2    Gani, A.3    Xia, F.4    Yang, L.T.5
  • 7
    • 80052396077 scopus 로고    scopus 로고
    • User authentication platform using provisioning in cloud computing environment
    • Brno, Czech republic: Springer-Verlag
    • Ahn H, Chang H, Jang C, Choi E. User authentication platform using provisioning in cloud computing environment. In: 3rd international conference on advanced communication and networking. Brno, Czech republic: Springer-Verlag; 2011. p. 132-8. doi: http://dx.doi.org/10.1007/978-3-642-23312-8-16.
    • (2011) 3rd International Conference on Advanced Communication and Networking , pp. 132-138
    • Ahn, H.1    Chang, H.2    Jang, C.3    Choi, E.4
  • 8
    • 84914666586 scopus 로고    scopus 로고
    • Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR
    • M. Aiash, and J. Loo Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR Int J Commun Syst 27 12 2013 3600 3618 10.1002/dac.2561
    • (2013) Int J Commun Syst , vol.27 , Issue.12 , pp. 3600-3618
    • Aiash, M.1    Loo, J.2
  • 10
    • 84904431043 scopus 로고    scopus 로고
    • A brief review of mobile cloud computing opportunities
    • M. Alizadeh, W.H. Hassan, N. Behboodian, and S. Karamizadeh A brief review of mobile cloud computing opportunities Res Notes Inf Sci 12 April 2013 155 160 10.4156/rnis.vol12.27
    • (2013) Res Notes Inf Sci , vol.12 , Issue.April , pp. 155-160
    • Alizadeh, M.1    Hassan, W.H.2    Behboodian, N.3    Karamizadeh, S.4
  • 12
    • 84894212054 scopus 로고    scopus 로고
    • Smartphone information security awareness: A victim of operational pressures
    • S. Allam, S.V. Flowerday, and E. Flowerday Smartphone information security awareness: a victim of operational pressures Comput Secur 42 May 2014 56 65 10.1016/j.cose.2014.01.005
    • (2014) Comput Secur , vol.42 , Issue.May , pp. 56-65
    • Allam, S.1    Flowerday, S.V.2    Flowerday, E.3
  • 13
  • 14
    • 84896334152 scopus 로고    scopus 로고
    • Mobile cloud computing framework for patients' health data analysis
    • M.A. Al-Zoube, and Y.A. Alqudah Mobile cloud computing framework for patients' health data analysis Biomed Eng: Appl, Basis Commun 26 02 2014 1450020-9. http://dx.doi.org/10.4015/S1016237214500203
    • (2014) Biomed Eng: Appl, Basis Commun , vol.26 , Issue.2 , pp. 1450020-1450029
    • Al-Zoube, M.A.1    Alqudah, Y.A.2
  • 15
    • 84914158898 scopus 로고    scopus 로고
    • Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues
    • N. Aminzadeh, Z. Sanaei, and S.H. Ab Hamid Mobile storage augmentation in mobile cloud computing: taxonomy, approaches, and open issues Simul Model Pract Theory 50 January 2015 96 108 10.1016/j.simpat.2014.05.009
    • (2015) Simul Model Pract Theory , vol.50 , Issue.January , pp. 96-108
    • Aminzadeh, N.1    Sanaei, Z.2    Ab Hamid, S.H.3
  • 16
    • 84933676368 scopus 로고    scopus 로고
    • An efficient block classification for media healthcare service in mobile cloud computing
    • N. An, C.-T. Huynh, B. Lee, C. Hong, and E.-N. Huh An efficient block classification for media healthcare service in mobile cloud computing Multimed Tools Appl 2014 1 15 10.1007/s11042-014-2039-6
    • (2014) Multimed Tools Appl , pp. 1-15
    • An, N.1    Huynh, C.-T.2    Lee, B.3    Hong, C.4    Huh, E.-N.5
  • 17
    • 84907207994 scopus 로고    scopus 로고
    • An anonymous end-to-end communication protocol for mobile cloud environments
    • C.A. Ardagna, M. Conti, M. Leone, and J. Stefa An anonymous end-to-end communication protocol for mobile cloud environments IEEE Trans Serv Comput 7 3 2014 373 386 10.1109/TSC.2014.2304717
    • (2014) IEEE Trans Serv Comput , vol.7 , Issue.3 , pp. 373-386
    • Ardagna, C.A.1    Conti, M.2    Leone, M.3    Stefa, J.4
  • 18
    • 84923693945 scopus 로고    scopus 로고
    • Interoperability issues on heterogeneous wireless communication for smart cities
    • E. Avelar, L. Marques, D. dos Passos, R. Macedo, K. Dias, and M. Nogueira Interoperability issues on heterogeneous wireless communication for smart cities Comput Commun 58 March 2015 4 15 10.1016/j.comcom.2014.07.005
    • (2015) Comput Commun , vol.58 , Issue.March , pp. 4-15
    • Avelar, E.1    Marques, L.2    Dos Passos, D.3    Macedo, R.4    Dias, K.5    Nogueira, M.6
  • 19
    • 84887982439 scopus 로고    scopus 로고
    • Enabling dynamic data and indirect mutual trust for cloud computing storage systems
    • A. Barsoum, A. Hasan, and S. Member Enabling dynamic data and indirect mutual trust for cloud computing storage systems IEEE Trans Parallel Distrib Syst 24 12 2013 2375 2385
    • (2013) IEEE Trans Parallel Distrib Syst , vol.24 , Issue.12 , pp. 2375-2385
    • Barsoum, A.1    Hasan, A.2    Member, S.3
  • 20
    • 84886397776 scopus 로고    scopus 로고
    • Risk-aware vertical handoff algorithm for security access support in heterogeneous wireless networks
    • Chongqing, China: IEEE
    • Bin M, Xiaofeng L, Xianzhong X. Risk-aware vertical handoff algorithm for security access support in heterogeneous wireless networks. In: 5th international conference on biomedical engineering and informatics. Chongqing, China: IEEE; 2012. p. 1515-9. http://dx.doi.org/10.1109/BMEI.2012.6512937.
    • (2012) 5th International Conference on Biomedical Engineering and Informatics , pp. 1515-1519
    • Bin, M.1    Xiaofeng, L.2    Xianzhong, X.3
  • 21
    • 84878353718 scopus 로고    scopus 로고
    • The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
    • San Francisco, USA: IEEE
    • Bonneau J, Herley C, van Oorschot PC, Stajano F. The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE symposium on security and privacy. San Francisco, USA: IEEE; 2012. p. 553-67. http://dx.doi.org/10.1109/SP.2012.44.
    • (2012) 2012 IEEE Symposium on Security and Privacy , pp. 553-567
    • Bonneau, J.1    Herley, C.2    Van Oorschot, P.C.3    Stajano, F.4
  • 23
    • 38049123111 scopus 로고    scopus 로고
    • Designing a trade-off between usability and security: A metrics based-model
    • C. Baranauskas, P. Palanque, J. Abascal, S. Barbosa, Springer Berlin, Heidelberg
    • C. Braz, A. Seffah, and D. MRaihi Designing a trade-off between usability and security: a metrics based-model C. Baranauskas, P. Palanque, J. Abascal, S. Barbosa, Human-computer interaction. Lecture notes in computer Science vol. 4663 2007 Springer Berlin, Heidelberg 114 126 10.1007/978-3-540-74800-7-9
    • (2007) Human-computer Interaction. Lecture Notes in Computer Science , vol.4663 , pp. 114-126
    • Braz, C.1    Seffah, A.2    MRaihi, D.3
  • 24
    • 82455221304 scopus 로고    scopus 로고
    • A cloud you can trust
    • C. Cachin, and M. Schunter A cloud you can trust IEEE Spectrum 48 12 2011 28 51
    • (2011) IEEE Spectrum , vol.48 , Issue.12 , pp. 28-51
    • Cachin, C.1    Schunter, M.2
  • 26
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • C.-C. Chang, C.-Y. Lee, and Y.-C. Chiu Enhanced authentication scheme with anonymity for roaming service in global mobility networks Comput Commun 32 4 2009 611 618 10.1016/j.comcom.2008.11.032
    • (2009) Comput Commun , vol.32 , Issue.4 , pp. 611-618
    • Chang, C.-C.1    Lee, C.-Y.2    Chiu, Y.-C.3
  • 27
    • 84897715339 scopus 로고    scopus 로고
    • Addressing data and user mobility challenges in the cloud
    • Santa Clara, USA: IEEE
    • Chen L, Hoang DB. Addressing data and user mobility challenges in the cloud. In: 2013 IEEE sixth international conference on cloud computing. Santa Clara, USA: IEEE; 2013. p. 549-56. http://dx.doi.org/10.1109/CLOUD.2013.26.
    • (2013) 2013 IEEE Sixth International Conference on Cloud Computing , pp. 549-556
    • Chen, L.1    Hoang, D.B.2
  • 28
    • 84885915860 scopus 로고    scopus 로고
    • Mobile learning system based on cloud computing
    • M. Chen, Y. Ma, Y. Liu, F. Jia, Y. Ran, and J. Wang Mobile learning system based on cloud computing J Netw 8 11 2013 2572 2577 10.4304/jnw.8.11.2572-2577
    • (2013) J Netw , vol.8 , Issue.11 , pp. 2572-2577
    • Chen, M.1    Ma, Y.2    Liu, Y.3    Jia, F.4    Ran, Y.5    Wang, J.6
  • 31
    • 84870184323 scopus 로고    scopus 로고
    • Secure data transmission with cloud computing in heterogeneous wireless networks
    • C.-H. Chu, Y.-C. Ouyang, and C.-B. Jang Secure data transmission with cloud computing in heterogeneous wireless networks Secur Commun Netw 5 12 2012 1325 1336 10.1002/sec.409
    • (2012) Secur Commun Netw , vol.5 , Issue.12 , pp. 1325-1336
    • Chu, C.-H.1    Ouyang, Y.-C.2    Jang, C.-B.3
  • 33
    • 33847652928 scopus 로고    scopus 로고
    • Advanced user authentication for mobile devices
    • N.L. Clarke, and S.M. Furnell Advanced user authentication for mobile devices Comput Secur 26 2 2007 109 119 10.1016/j.cose.2006.08.008
    • (2007) Comput Secur , vol.26 , Issue.2 , pp. 109-119
    • Clarke, N.L.1    Furnell, S.M.2
  • 34
    • 0036276843 scopus 로고    scopus 로고
    • Acceptance of subscriber authentication methods for mobile telephony devices
    • N.L. Clarke, S.M. Furnell, P.M. Rodwell, and P.L. Reynolds Acceptance of subscriber authentication methods for mobile telephony devices Comput Secur 21 3 2002 220 228 10.1016/S0167-4048(02)00304-8
    • (2002) Comput Secur , vol.21 , Issue.3 , pp. 220-228
    • Clarke, N.L.1    Furnell, S.M.2    Rodwell, P.M.3    Reynolds, P.L.4
  • 35
    • 84888866054 scopus 로고    scopus 로고
    • A framework for continuous, transparent mobile device authentication
    • H. Crawford, K. Renaud, and T. Storer A framework for continuous, transparent mobile device authentication Comput Secur 39 Part B, November 2013 127 136 10.1016/j.cose.2013.05.005
    • (2013) Comput Secur , vol.39 , Issue.November , pp. 127-136
    • Crawford, H.1    Renaud, K.2    Storer, T.3
  • 39
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications and approaches
    • H.T. Dinh, C. Lee, D. Niyato, and P. Wang A survey of mobile cloud computing: architecture, applications and approaches Wirel Commun Mob Comput 13 18 2013 1587 1611
    • (2013) Wirel Commun Mob Comput , vol.13 , Issue.18 , pp. 1587-1611
    • Dinh, H.T.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 40
    • 83255181843 scopus 로고    scopus 로고
    • Shallow analysis of mobile learning environment under Cloud computing
    • Switzerland, Kuala Lumpur, Malaysia: Trans Tech Publications
    • Dong J, Han J, Liu J, Yin H. Shallow analysis of mobile learning environment under Cloud computing. In: 2011 7th international conference on MEMS, NANO and smart systems. Switzerland, Kuala Lumpur, Malaysia: Trans Tech Publications; 2012. p. 1447-50. http://dx.doi.org/10.4028/www.scientific.net/AMR.403-408.1447.
    • (2012) 2011 7th International Conference on MEMS, NANO and Smart Systems , pp. 1447-1450
    • Dong, J.1    Han, J.2    Liu, J.3    Yin, H.4
  • 42
    • 84929587517 scopus 로고    scopus 로고
    • On security in publish/subscribe services: A survey
    • Esposito C, Ciampi M. On security in publish/subscribe services: a survey. IEEE Commun Surv Tutor 2015; PP (99). http://dx.doi.org/10.1109/COMST.2014.2364616.
    • (2015) IEEE Commun Surv Tutor , pp. 99
    • Esposito, C.1    Ciampi, M.2
  • 43
    • 84862998994 scopus 로고    scopus 로고
    • Mobile cloud computing: A survey
    • N. Fernando, S.W. Loke, and W. Rahayu Mobile cloud computing: a survey Future Gener Comput Syst 29 1 2013 84 106 10.1016/j.future.2012.05.023
    • (2013) Future Gener Comput Syst , vol.29 , Issue.1 , pp. 84-106
    • Fernando, N.1    Loke, S.W.2    Rahayu, W.3
  • 45
    • 0033633028 scopus 로고    scopus 로고
    • Authentication and supervision: A survey of user attitudes
    • S.M. Furnell, P.S. Dowland, H.M. Illingworth, and P.L. Reynolds Authentication and supervision: a survey of user attitudes Comput Secur 19 6 2000 529 539 10.1016/S0167-4048(00)06027-2
    • (2000) Comput Secur , vol.19 , Issue.6 , pp. 529-539
    • Furnell, S.M.1    Dowland, P.S.2    Illingworth, H.M.3    Reynolds, P.L.4
  • 46
    • 49849102834 scopus 로고    scopus 로고
    • Beyond the PIN: Enhancing user authentication for mobile devices
    • S. Furnell, N. Clarke, and S. Karatzouni Beyond the PIN: enhancing user authentication for mobile devices Comput Fraud Secur 2008 8 2008 12 17 10.1016/S1361-3723(08)70127-1
    • (2008) Comput Fraud Secur , vol.2008 , Issue.8 , pp. 12-17
    • Furnell, S.1    Clarke, N.2    Karatzouni, S.3
  • 47
    • 84901446600 scopus 로고    scopus 로고
    • A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing
    • A. Gani, G.M. Nayeem, M. Shiraz, M. Sookhak, M. Whaiduzzaman, and S. Khan A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing J Netw Comput Appl 43 August 2014 84 102 10.1016/j.jnca.2014.04.009
    • (2014) J Netw Comput Appl , vol.43 , Issue.August , pp. 84-102
    • Gani, A.1    Nayeem, G.M.2    Shiraz, M.3    Sookhak, M.4    Whaiduzzaman, M.5    Khan, S.6
  • 48
    • 84896351749 scopus 로고    scopus 로고
    • Trusted computing strengthens cloud authentication
    • E. Ghazizadeh, M. Zamani, J.L. Ab Manan, and M. Alizadeh Trusted computing strengthens cloud authentication Sci World J 2014 2014 17 10.1155/2014/260187
    • (2014) Sci World J , vol.2014 , pp. 17
    • Ghazizadeh, E.1    Zamani, M.2    Ab Manan, J.L.3    Alizadeh, M.4
  • 51
    • 80054816611 scopus 로고    scopus 로고
    • Security analysis of authentication protocols for next-generation mobile and CE cloud services
    • Berlin, Germany: IEEE
    • Grzonkowski S, Corcoran PM, Coughlin T. Security analysis of authentication protocols for next-generation mobile and CE cloud services. In: 2011 IEEE international conference on consumer electronics. Berlin, Germany: IEEE; 2011. p. 83-7. http://dx.doi.org/10.1109/ICCE-Berlin.2011.6031855.
    • (2011) 2011 IEEE International Conference on Consumer Electronics , pp. 83-87
    • Grzonkowski, S.1    Corcoran, P.M.2    Coughlin, T.3
  • 53
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu A strong user authentication scheme with smart cards for wireless communications Comput Commun 34 3 2011 367 374 10.1016/j.comcom.2010.02.031
    • (2011) Comput Commun , vol.34 , Issue.3 , pp. 367-374
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 54
    • 84924912680 scopus 로고    scopus 로고
    • User privacy and data trustworthiness in mobile crowd sensing
    • D. He, S. Chan, and M. Guizani User privacy and data trustworthiness in mobile crowd sensing IEEE Wirel Commun 22 1 2015 28 34 10.1109/MWC.2015.7054716
    • (2015) IEEE Wirel Commun , vol.22 , Issue.1 , pp. 28-34
    • He, D.1    Chan, S.2    Guizani, M.3
  • 55
    • 84924860324 scopus 로고    scopus 로고
    • Mobile application security: Malware threats and defenses
    • D. He, S. Chan, and M. Guizani Mobile application security: malware threats and defenses IEEE Wirele Commun 22 1 2015 138 144 10.1109/MWC.2015.7054729
    • (2015) IEEE Wirele Commun , vol.22 , Issue.1 , pp. 138-144
    • He, D.1    Chan, S.2    Guizani, M.3
  • 56
    • 79952406420 scopus 로고    scopus 로고
    • Mobile cloud for assistive healthcare (MoCAsH)
    • Hangzhou, China: IEEE
    • Hoang DB, Chen L. Mobile cloud for assistive healthcare (MoCAsH). In: 2010 IEEE Asia-Pacific services computing conference, APSCC. Hangzhou, China: IEEE; 2010. p. 325-32. http://dx.doi.org/10.1109/APSCC.2010.102.
    • (2010) 2010 IEEE Asia-Pacific Services Computing Conference, APSCC , pp. 325-332
    • Hoang, D.B.1    Chen, L.2
  • 57
    • 84896907019 scopus 로고    scopus 로고
    • Security protection between users and the mobile media cloud
    • W. Honggang, W. Shaoen, C. Min, and W. Wei Security protection between users and the mobile media cloud IEEE Commun Mag 52 3 2014 73 79 10.1109/MCOM.2014.6766088
    • (2014) IEEE Commun Mag , vol.52 , Issue.3 , pp. 73-79
    • Honggang, W.1    Shaoen, W.2    Min, C.3    Wei, W.4
  • 58
    • 80053093060 scopus 로고    scopus 로고
    • The study of mobile education development based on 3G technique and cloud computing
    • Kuala Lumpur, Malaysia: IEEE
    • Huang B. The study of mobile education development based on 3G technique and cloud computing. In: 2011 international conference on uncertainty reasoning and knowledge engineering. Kuala Lumpur, Malaysia: IEEE; 2011. p. 86-9. http://dx.doi.org/10.1109/URKE.2011.6007847.
    • (2011) 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering , pp. 86-89
    • Huang, B.1
  • 62
    • 79952030338 scopus 로고    scopus 로고
    • Energy-efficient incremental integrity for securing storage in mobile cloud computing
    • Cairo, Egypt: IEEE
    • Itani W, Kayssi A, Chehab A. Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: 2010 international conference on energy aware computing. Cairo, Egypt: IEEE; 2010. p. 1-2. http://dx.doi.org/10.1109/ICEAC.2010.5702296.
    • (2010) 2010 International Conference on Energy Aware Computing , pp. 1-2
    • Itani, W.1    Kayssi, A.2    Chehab, A.3
  • 63
    • 84894461122 scopus 로고    scopus 로고
    • Efficient management of security and privacy issues in mobile cloud environment
    • Mumbai, India: IEEE
    • Jana D, Bandyopadhyay D. Efficient management of security and privacy issues in mobile cloud environment. In: 2013 annual IEEE india conference. Mumbai, India: IEEE; 2013. p. 1-6. http://dx.doi.org/10.1109/INDCON.2013.6726077.
    • (2013) 2013 Annual IEEE India Conference , pp. 1-6
    • Jana, D.1    Bandyopadhyay, D.2
  • 65
    • 84922233101 scopus 로고    scopus 로고
    • An efficient authentication system of smart device using multi factors in mobile cloud service architecture
    • Y.-S. Jeong, J.S. Park, and J.H. Park An efficient authentication system of smart device using multi factors in mobile cloud service architecture Int J Commun Syst 28 4 2015 659 674 10.1002/dac.2694
    • (2015) Int J Commun Syst , vol.28 , Issue.4 , pp. 659-674
    • Jeong, Y.-S.1    Park, J.S.2    Park, J.H.3
  • 66
    • 84876756234 scopus 로고    scopus 로고
    • A study of secure data transmissions in mobile cloud computing from the energy consumption side
    • Bangkok, Thailand: IEEE
    • Jin AH, Sangmin S, Namgi K, Byoung-Dai L. A study of secure data transmissions in mobile cloud computing from the energy consumption side. In: 2013 international conference on information networking. Bangkok, Thailand: IEEE; 2013. p. 250-5. http://dx.doi.org/10.1109/ICOIN.2013.6496385.
    • (2013) 2013 International Conference on Information Networking , pp. 250-255
    • Jin, A.H.1    Sangmin, S.2    Namgi, K.3    Byoung-Dai, L.4
  • 67
    • 84890452158 scopus 로고    scopus 로고
    • A framework for cooperative resource management in mobile cloud computing
    • R. Kaewpuang, D. Niyato, P. Wang, and E. Hossain A framework for cooperative resource management in mobile cloud computing IEEE J Sel Areas Commun 31 12 2013 2685 2700 10.1109/JSAC.2013.131209
    • (2013) IEEE J Sel Areas Commun , vol.31 , Issue.12 , pp. 2685-2700
    • Kaewpuang, R.1    Niyato, D.2    Wang, P.3    Hossain, E.4
  • 68
    • 84897983792 scopus 로고    scopus 로고
    • Consolidated identity management system for secure mobile cloud computing
    • I. Khalil, A. Khreishah, and M. Azeem Consolidated identity management system for secure mobile cloud computing Comput Netw 65 June 2014 99 110 10.1016/j.comnet.2014.03.015
    • (2014) Comput Netw , vol.65 , Issue.June , pp. 99-110
    • Khalil, I.1    Khreishah, A.2    Azeem, M.3
  • 69
    • 84866668858 scopus 로고    scopus 로고
    • Towards secure mobile cloud computing: A survey
    • A.N. Khan, M. Mat Kiah, S.U. Khan, and S.A. Madani Towards secure mobile cloud computing: a survey Future Gener Comput Syst 29 5 2013 1278 1299 10.1016/j.future.2012.08.003
    • (2013) Future Gener Comput Syst , vol.29 , Issue.5 , pp. 1278-1299
    • Khan, A.N.1    Mat Kiah, M.2    Khan, S.U.3    Madani, S.A.4
  • 70
    • 84888011760 scopus 로고    scopus 로고
    • Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
    • A.N. Khan, M.L. Mat Kiah, S.a. Madani, A.U.R. Khan, and M. Ali Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing J Supercomput 66 3 2013 1687 1706 10.1007/s11227-013-0967-y
    • (2013) J Supercomput , vol.66 , Issue.3 , pp. 1687-1706
    • Khan, A.N.1    Mat Kiah, M.L.2    Madani, S.A.3    Khan, A.U.R.4    Ali, M.5
  • 71
    • 84893408486 scopus 로고    scopus 로고
    • A study of incremental cryptography for security schemes in mobile cloud computing environments
    • Kouching, Malaysia: IEEE
    • Khan AN, Kiah MLM, Khan SU, Madani SA, Khan AR. A study of incremental cryptography for security schemes in mobile cloud computing environments. In: 2013 IEEE symposium on wireless technology and applications. Kouching, Malaysia: IEEE; 2013. p. 62-7. http://dx.doi.org/10.1109/ISWTA.2013.6688818.
    • (2013) 2013 IEEE Symposium on Wireless Technology and Applications , pp. 62-67
    • Khan, A.N.1    Kiah, M.L.M.2    Khan, S.U.3    Madani, S.A.4    Khan, A.R.5
  • 72
    • 84901987724 scopus 로고    scopus 로고
    • Incremental proxy re-encryption scheme for mobile cloud computing environment
    • A. Khan, M.L.M. Kiah, S. Madani, M. Ali, A. Khan, and S. Shamshirband Incremental proxy re-encryption scheme for mobile cloud computing environment J Supercomput 68 2 2014 624 651 10.1007/s11227-013-1055-z
    • (2014) J Supercomput , vol.68 , Issue.2 , pp. 624-651
    • Khan, A.1    Kiah, M.L.M.2    Madani, S.3    Ali, M.4    Khan, A.5    Shamshirband, S.6
  • 74
    • 84883686657 scopus 로고    scopus 로고
    • Mobile cloud computing security considerations
    • S.K.V. Ko, J.H. Lee, and S.W. Kim Mobile cloud computing security considerations J Secur Eng 9 2 2012 143 150
    • (2012) J Secur Eng , vol.9 , Issue.2 , pp. 143-150
    • Ko, S.K.V.1    Lee, J.H.2    Kim, S.W.3
  • 75
    • 84904369720 scopus 로고    scopus 로고
    • Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems
    • Wuhan, China: IEEE
    • Kumar R, Rajalakshmi S. Mobile cloud computing: standard approach to protecting and securing of mobile cloud ecosystems. In: 2013 international conference on computer sciences and applications. Wuhan, China: IEEE; 2013. p. 663-9. http://dx.doi.org/10.1109/CSA.2013.161.
    • (2013) 2013 International Conference on Computer Sciences and Applications , pp. 663-669
    • Kumar, R.1    Rajalakshmi, S.2
  • 78
    • 84894374966 scopus 로고    scopus 로고
    • NemoAuth: A mnemonic multimodal approach to mobile user authentication
    • Xi'an, China: IEEE
    • Le Z, Zhang X, Gao Z. NemoAuth: a mnemonic multimodal approach to mobile user authentication. In: 2013 IEEE region 10 conference (31194). Xi'an, China: IEEE; 2013. p. 1-6.
    • (2013) 2013 IEEE Region 10 Conference (31194) , pp. 1-6
    • Le, Z.1    Zhang, X.2    Gao, Z.3
  • 79
    • 84897766928 scopus 로고    scopus 로고
    • Challenges on wireless heterogeneous networks for mobile cloud computing
    • L. Lei, Z. Zhong, K. Zheng, J. Chen, and H. Meng Challenges on wireless heterogeneous networks for mobile cloud computing IEEE Wirel Commun 20 3 2013 http://dx.doi.org/10.1109/MWC.2013.6549281
    • (2013) IEEE Wirel Commun , vol.20 , Issue.3
    • Lei, L.1    Zhong, Z.2    Zheng, K.3    Chen, J.4    Meng, H.5
  • 80
    • 84904703469 scopus 로고    scopus 로고
    • Phased scheduling for resource-constrained mobile devices in mobile cloud computing
    • C. Li, and L. Li Phased scheduling for resource-constrained mobile devices in mobile cloud computing Wirel Person Commun 77 4 2014 2817 2837 10.1007/s11277-014-1669-3
    • (2014) Wirel Person Commun , vol.77 , Issue.4 , pp. 2817-2837
    • Li, C.1    Li, L.2
  • 81
  • 82
    • 84961396818 scopus 로고    scopus 로고
    • A service-oriented identity authentication privacy protection method in cloud computing
    • X. Li, J. He, and T. Zhang A service-oriented identity authentication privacy protection method in cloud computing Int J Grid Distrib Comput 6 1 2013 77 86
    • (2013) Int J Grid Distrib Comput , vol.6 , Issue.1 , pp. 77-86
    • Li, X.1    He, J.2    Zhang, T.3
  • 83
    • 84897715339 scopus 로고    scopus 로고
    • Addressing data and user mobility challenges in the cloud
    • Santa Clara, USA: IEEE
    • Lingfeng C, Hoang DB. Addressing data and user mobility challenges in the cloud. In: 2013 IEEE sixth international conference on cloud computing. Santa Clara, USA: IEEE; 2013. p. 549-56. http://dx.doi.org/10.1109/CLOUD.2013.26.
    • (2013) 2013 IEEE Sixth International Conference on Cloud Computing , pp. 549-556
    • Lingfeng, C.1    Hoang, D.B.2
  • 85
    • 84918562009 scopus 로고    scopus 로고
    • Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions
    • J. Liu, E. Ahmed, M. Shiraz, A. Gani, R. Buyya, and A. Qureshi Application partitioning algorithms in mobile cloud computing: taxonomy, review and future directions J Netw Comput Appl 48 February 2015 99 117 10.1016/j.jnca.2014.09.009
    • (2015) J Netw Comput Appl , vol.48 , Issue.February , pp. 99-117
    • Liu, J.1    Ahmed, E.2    Shiraz, M.3    Gani, A.4    Buyya, R.5    Qureshi, A.6
  • 86
    • 8344266879 scopus 로고    scopus 로고
    • Authentication and authorization infrastructures (AAIs): A comparative survey
    • J. Lopez, R. Oppliger, and G. Pernul Authentication and authorization infrastructures (AAIs): a comparative survey Comput Secur 23 7 2004 578 590 10.1016/j.cose.2004.06.013
    • (2004) Comput Secur , vol.23 , Issue.7 , pp. 578-590
    • Lopez, J.1    Oppliger, R.2    Pernul, G.3
  • 87
    • 84934913465 scopus 로고    scopus 로고
    • An analysis of security system for intrusion in smartphone environment
    • M. Louk, H. Lim, and H. Lee An analysis of security system for intrusion in smartphone environment Sci World J 2014 2014 1 12 10.1155/2014/983901
    • (2014) Sci World J , vol.2014 , pp. 1-12
    • Louk, M.1    Lim, H.2    Lee, H.3
  • 89
    • 84898461830 scopus 로고    scopus 로고
    • Cloud and mobile computing: Affordances of the 21st century teaching and learning
    • Dubai, UAE: IEEE
    • Mahalingam T, Rajan AV. Cloud and mobile computing: affordances of the 21st century teaching and learning. In: 2013 international conference on current trends in information technology. Dubai, UAE: IEEE; 2013. p. 125-8. http://dx.doi.org/10.1109/CTIT.2013.6749490.
    • (2013) 2013 International Conference on Current Trends in Information Technology , pp. 125-128
    • Mahalingam, T.1    Rajan, A.V.2
  • 92
    • 84877896878 scopus 로고    scopus 로고
    • Data security in the cloud
    • B. Rajkumar, B. James, G. Andrzej, John Wiley & Sons, Inc.
    • S. Morrow Data security in the cloud B. Rajkumar, B. James, G. Andrzej, Cloud computing: principles and paradigms 2011 John Wiley & Sons, Inc. 573 592
    • (2011) Cloud Computing: Principles and Paradigms , pp. 573-592
    • Morrow, S.1
  • 94
    • 84891843335 scopus 로고    scopus 로고
    • Delegate the smartphone user? Security awareness in smartphone platforms
    • A. Mylonas, A. Kastania, and D. Gritzalis Delegate the smartphone user? Security awareness in smartphone platforms Comput Secur 34 May 2013 47 66 10.1016/j.cose.2012.11.004
    • (2013) Comput Secur , vol.34 , Issue.May , pp. 47-66
    • Mylonas, A.1    Kastania, A.2    Gritzalis, D.3
  • 95
    • 84945977000 scopus 로고    scopus 로고
    • Multi-dimensional and multi-level authentication techniques
    • T. Naik, and S. Koul Multi-dimensional and multi-level authentication techniques Int J Comput Appl 75 12 2013 17 22
    • (2013) Int J Comput Appl , vol.75 , Issue.12 , pp. 17-22
    • Naik, T.1    Koul, S.2
  • 96
    • 84881480645 scopus 로고    scopus 로고
    • An authentication model towards cloud federation in the enterprise
    • M. Noureddine, and R. Bashroush An authentication model towards cloud federation in the enterprise J Syst Softw 86 9 2013 2269 2275 10.1016/j.jss.2012.12.031
    • (2013) J Syst Softw , vol.86 , Issue.9 , pp. 2269-2275
    • Noureddine, M.1    Bashroush, R.2
  • 97
    • 79960141443 scopus 로고    scopus 로고
    • A study on authentication system using QR code for mobile cloud computing environment
    • Loutraki, Greece: Springer-Verlag
    • Oh D-S, Kim B-H, Lee J-K. A study on authentication system using QR code for mobile cloud computing environment. In: 6th international conference on future information technology. Loutraki, Greece: Springer-Verlag; 2011. p. 500-7. http://dx.doi.org/10.1007/978-3-642-22333-4-65.
    • (2011) 6th International Conference on Future Information Technology , pp. 500-507
    • Oh, D.-S.1    Kim, B.-H.2    Lee, J.-K.3
  • 101
    • 0346895307 scopus 로고    scopus 로고
    • Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    • C.-S. Park Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Comput Netw 44 2 2004 267 273 10.1016/j.comnet.2003.09.001
    • (2004) Comput Netw , vol.44 , Issue.2 , pp. 267-273
    • Park, C.-S.1
  • 102
    • 81255210704 scopus 로고    scopus 로고
    • SSP-MCloud: A study on security service protocol for smartphone centric mobile cloud computing
    • J.J. Park, H. Arabnia, H.-B. Chang, T. Shon, Springer Netherlands
    • J. Park, K. Yi, and J. Park SSP-MCloud: a study on security service protocol for smartphone centric mobile cloud computing J.J. Park, H. Arabnia, H.-B. Chang, T. Shon, IT convergence and services lecture notes in electrical engineering. Lecture notes in electrical Engineering vol. 107 2011 Springer Netherlands 165 172 10.1007/978-94-007-2598-0-18
    • (2011) IT Convergence and Services Lecture Notes in Electrical Engineering. Lecture Notes in Electrical Engineering , vol.107 , pp. 165-172
    • Park, J.1    Yi, K.2    Park, J.3
  • 103
    • 84901190797 scopus 로고    scopus 로고
    • Smartphone malware and its propagation modeling: A survey
    • S. Peng, S. Yu, and A. Yang Smartphone malware and its propagation modeling: a survey IEEE Commun Surv Tutor 16 2 2014 925 941 10.1109/SURV.2013.070813.00214
    • (2014) IEEE Commun Surv Tutor , vol.16 , Issue.2 , pp. 925-941
    • Peng, S.1    Yu, S.2    Yang, A.3
  • 105
    • 80055106772 scopus 로고    scopus 로고
    • Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues
    • Beijing, China: IEEE Computer Society
    • Qureshi SS, Ahmad T, Rafique K, Shuja Ul I. Mobile cloud computing as future for mobile applications - implementation methods and challenging issues. In: 2011 IEEE international conference on cloud computing and intelligence systems. Beijing, China: IEEE Computer Society; 2011. p. 467-71. http://dx.doi.org/10.1109/CCIS.2011.6045111.
    • (2011) 2011 IEEE International Conference on Cloud Computing and Intelligence Systems , pp. 467-471
    • Qureshi, S.S.1    Ahmad, T.2    Rafique, K.3    Shuja Ul, I.4
  • 107
  • 108
    • 84899854200 scopus 로고    scopus 로고
    • Security and privacy issues in cloud computing
    • S. Rahul, and D.J.K. Sharda Security and privacy issues in cloud computing Int J Eng Res Technol 2 3 2013
    • (2013) Int J Eng Res Technol , vol.2 , Issue.3
    • Rahul, S.1    Sharda, D.J.K.2
  • 109
    • 80053551895 scopus 로고    scopus 로고
    • Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
    • W. Ren, L. Yu, R. Gao, and F. Xiong Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing Tsinghua Sci Technol 16 5 2011 520 528
    • (2011) Tsinghua Sci Technol , vol.16 , Issue.5 , pp. 520-528
    • Ren, W.1    Yu, L.2    Gao, R.3    Xiong, F.4
  • 110
    • 80053099984 scopus 로고    scopus 로고
    • A survey of authentication schemes for vehicular ad hoc networks
    • M. Riley, K. Akkaya, and K. Fong A survey of authentication schemes for vehicular ad hoc networks Secur Commun Netw 4 10 2011 1137 1152 10.1002/sec.239
    • (2011) Secur Commun Netw , vol.4 , Issue.10 , pp. 1137-1152
    • Riley, M.1    Akkaya, K.2    Fong, K.3
  • 112
    • 84869179184 scopus 로고    scopus 로고
    • SAMI: Service-based arbitrated multi-tier infrastructure model for mobile cloud computing
    • Beijing, China: IEEE
    • Sanaei Z, Abolfazli S, Shiraz M, Gani A. SAMI: service-based arbitrated multi-tier infrastructure model for mobile cloud computing. In: Proceedings of the IEEE MobiCC'12. Beijing, China: IEEE; 2012. p. 14-9.
    • (2012) Proceedings of the IEEE MobiCC'12 , pp. 14-19
    • Sanaei, Z.1    Abolfazli, S.2    Shiraz, M.3    Gani, A.4
  • 113
    • 84894675432 scopus 로고    scopus 로고
    • Heterogeneity in mobile cloud computing: Taxonomy and open challenges
    • Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya Heterogeneity in mobile cloud computing: taxonomy and open challenges IEEE Commun Surv Tutor 16 1 2013 369 392 10.1109/SURV.2013.050113.00090
    • (2013) IEEE Commun Surv Tutor , vol.16 , Issue.1 , pp. 369-392
    • Sanaei, Z.1    Abolfazli, S.2    Gani, A.3    Buyya, R.4
  • 114
    • 84876140272 scopus 로고    scopus 로고
    • A lightweight multi-user authentication scheme based on cellular automata in cloud environment
    • Paris, France: IEEE
    • Sang-Ho S, Dong-Hyun K, Yoo K-Y. A lightweight multi-user authentication scheme based on cellular automata in cloud environment. In: 2012 IEEE 1st international conference on cloud networking. Paris, France: IEEE; 2012. p. 176-8. doi: http://dx.doi.org/10.1109/CloudNet.2012.6483680.
    • (2012) 2012 IEEE 1st International Conference on Cloud Networking , pp. 176-178
    • Sang-Ho, S.1    Dong-Hyun, K.2    Yoo, K.-Y.3
  • 115
    • 70350136710 scopus 로고    scopus 로고
    • The case for VM-based cloudlets in mobile computing
    • M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies The case for VM-based cloudlets in mobile computing IEEE Pervas Comput 8 4 2009 14 23 10.1109/MPRV.2009.82
    • (2009) IEEE Pervas Comput , vol.8 , Issue.4 , pp. 14-23
    • Satyanarayanan, M.1    Bahl, P.2    Caceres, R.3    Davies, N.4
  • 117
    • 84941111729 scopus 로고    scopus 로고
    • Security issues and challenges of mobile cloud computing
    • A. Shahzad, and M. Hussain Security issues and challenges of mobile cloud computing Int J Grid Distrib Comput 6 6 2013 37 50 10.14257/ijgdc.2013.6.6.04
    • (2013) Int J Grid Distrib Comput , vol.6 , Issue.6 , pp. 37-50
    • Shahzad, A.1    Hussain, M.2
  • 118
    • 77955209580 scopus 로고    scopus 로고
    • Mobility can help: Protect user identity with dynamic credential
    • Kansas City, USA: IEEE
    • Sheng X, Gong W. Mobility can help: protect user identity with dynamic credential. In: 2010 eleventh international conference on mobile data management. Kansas City, USA: IEEE; 2010. p. 378-80. http://dx.doi.org/10.1109/MDM.2010.73.
    • (2010) 2010 Eleventh International Conference on Mobile Data Management , pp. 378-380
    • Sheng, X.1    Gong, W.2
  • 119
    • 85037074313 scopus 로고    scopus 로고
    • Implicit authentication through learning user behavior
    • M. Burmester, G. Tsudik, S. Magliveras, I. Ilić, Springer Berlin, Heidelberg
    • E. Shi, Y. Niu, M. Jakobsson, and R. Chow Implicit authentication through learning user behavior M. Burmester, G. Tsudik, S. Magliveras, I. Ilić, Information security. Lecture notes in computer science Vol. 6531 2011 Springer Berlin, Heidelberg 99 113 10.1007/978-3-642-18178-8-9
    • (2011) Information Security. Lecture Notes in Computer Science , vol.6531 , pp. 99-113
    • Shi, E.1    Niu, Y.2    Jakobsson, M.3    Chow, R.4
  • 120
    • 84904212775 scopus 로고    scopus 로고
    • Toward advanced mobile cloud computing for the internet of things: Current issues and future direction
    • T. Shon, J. Cho, K. Han, and H. Choi Toward advanced mobile cloud computing for the internet of things: current issues and future direction Mob Netw Appl 19 3 2014 404 413 10.1007/s11036-014-0509-8
    • (2014) Mob Netw Appl , vol.19 , Issue.3 , pp. 404-413
    • Shon, T.1    Cho, J.2    Han, K.3    Choi, H.4
  • 121
    • 84939120748 scopus 로고    scopus 로고
    • FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and genetic method
    • M. Shojafar, S. Javanmardi, S. Abolfazli, and N. Cordeschi FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and genetic method Cluster Compute 18 2 2015 829 844
    • (2015) Cluster Compute , vol.18 , Issue.2 , pp. 829-844
    • Shojafar, M.1    Javanmardi, S.2    Abolfazli, S.3    Cordeschi, N.4
  • 122
    • 84907343141 scopus 로고    scopus 로고
    • QoS-aware dynamic resource management in heterogeneous mobile cloud computing networks
    • P. Si, Q. Zhang, Y.F. Richard, and Y. Zhang QoS-aware dynamic resource management in heterogeneous mobile cloud computing networks China Commun 11 4 2014 144 159
    • (2014) China Commun , vol.11 , Issue.4 , pp. 144-159
    • Si, P.1    Zhang, Q.2    Richard, Y.F.3    Zhang, Y.4
  • 123
    • 0024015453 scopus 로고
    • A survey of information authentication
    • G.J. Simmons A survey of information authentication Proc IEEE 76 5 1988 603 620 10.1109/5.4445
    • (1988) Proc IEEE , vol.76 , Issue.5 , pp. 603-620
    • Simmons, G.J.1
  • 124
    • 84938775953 scopus 로고    scopus 로고
    • Design and implementation of multi-tier authentication scheme in cloud
    • 5-2
    • M. Singh, and S. Singh Design and implementation of multi-tier authentication scheme in cloud Int J Comput Sci Issues 9 5 5-2 2012 181 187
    • (2012) Int J Comput Sci Issues , vol.9 , Issue.5 , pp. 181-187
    • Singh, M.1    Singh, S.2
  • 125
    • 84863185930 scopus 로고    scopus 로고
    • TrustCube: An infrastructure that builds trust in client
    • D. Gawrock, H. Reimer, A.-R. Sadeghi, C. Vishik, Vieweg+Teubner
    • Z. Song, J. Molina, S. Lee, H. Lee, S. Kotani, and R. Masuoka TrustCube: an infrastructure that builds trust in client D. Gawrock, H. Reimer, A.-R. Sadeghi, C. Vishik, Future of trust in computing 2009 Vieweg+Teubner 68 79 10.1007/978-3-8348-9324-6-8
    • (2009) Future of Trust in Computing , pp. 68-79
    • Song, Z.1    Molina, J.2    Lee, S.3    Lee, H.4    Kotani, S.5    Masuoka, R.6
  • 126
    • 84874343540 scopus 로고    scopus 로고
    • Design and implementation of the web content adaptation for intelligent tourism cloud platform
    • Liaoning, China: IEEE
    • Song R, Li S, Yao Z, Li X. Design and implementation of the web content adaptation for intelligent tourism cloud platform. In: 2012 international conference on control engineering and communication technology. Liaoning, China: IEEE; 2012. p. 759-62. http://dx.doi.org/10.1109/ICCECT.2012.100.
    • (2012) 2012 International Conference on Control Engineering and Communication Technology , pp. 759-762
    • Song, R.1    Li, S.2    Yao, Z.3    Li, X.4
  • 127
    • 84867509247 scopus 로고    scopus 로고
    • A combined approach to ensure data security in cloud computing
    • S.K. Sood A combined approach to ensure data security in cloud computing J Netw Comput Appl 35 6 2012 1831 1838 10.1016/j.jnca.2012.07.007
    • (2012) J Netw Comput Appl , vol.35 , Issue.6 , pp. 1831-1838
    • Sood, S.K.1
  • 128
    • 84901607854 scopus 로고    scopus 로고
    • A review on remote data auditing in single cloud server: Taxonomy and open issues
    • M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M.K. Khan A review on remote data auditing in single cloud server: taxonomy and open issues J Netw Comput Appl 43 August 2014 121 141 10.1016/j.jnca.2014.04.011
    • (2014) J Netw Comput Appl , vol.43 , Issue.August , pp. 121-141
    • Sookhak, M.1    Talebian, H.2    Ahmed, E.3    Gani, A.4    Khan, M.K.5
  • 131
    • 33750084748 scopus 로고    scopus 로고
    • Quantifying interactive user experience on thin clients
    • N. Tolia, D.G. Andersen, and M. Satyanarayanan Quantifying interactive user experience on thin clients Computer 39 3 2006 46 52
    • (2006) Computer , vol.39 , Issue.3 , pp. 46-52
    • Tolia, N.1    Andersen, D.G.2    Satyanarayanan, M.3
  • 132
    • 84860738671 scopus 로고    scopus 로고
    • Robust mobile device integration of a fingerprint biometric remote authentication scheme
    • Fukuoka, Japan: Institute of Electrical and Electronics Engineers Inc.
    • Truong T-T, Tran M, Duong A-D. Robust mobile device integration of a fingerprint biometric remote authentication scheme. In: 26th IEEE international conference on advanced information networking and applications. Fukuoka, Japan: Institute of Electrical and Electronics Engineers Inc.; 2012. p. 678-5. http://dx.doi.org/10.1109/AINA.2012.47.
    • (2012) 26th IEEE International Conference on Advanced Information Networking and Applications , pp. 678-685
    • Truong, T.-T.1    Tran, M.2    Duong, A.-D.3
  • 133
    • 84899099915 scopus 로고    scopus 로고
    • Adaptive deployment and configuration for mobile augmented reality in the cloudlet
    • T. Verbelen, P. Simoens, F. De Turck, and B. Dhoedt Adaptive deployment and configuration for mobile augmented reality in the cloudlet J Netw Comput Appl 41 May 2014 206 216 10.1016/j.jnca.2013.12.002
    • (2014) J Netw Comput Appl , vol.41 , Issue.May , pp. 206-216
    • Verbelen, T.1    Simoens, P.2    De Turck, F.3    Dhoedt, B.4
  • 134
    • 84876464266 scopus 로고    scopus 로고
    • Data security and authentication in hybrid cloud computing model
    • Shenzhen, China: IEEE
    • Wang JK, Jia X. Data security and authentication in hybrid cloud computing model. In: 2012 IEEE global high tech congress on electronics. Shenzhen, China: IEEE; 2012. p. 117-20. doi: http://dx.doi.org/10.1109/GHTCE.2012.6490136.
    • (2012) 2012 IEEE Global High Tech Congress on Electronics , pp. 117-120
    • Wang, J.K.1    Jia, X.2
  • 135
    • 84871750400 scopus 로고    scopus 로고
    • Smartphone security challenges
    • Y. Wang, K. Streff, and S. Raman Smartphone security challenges Computer 45 12 2012 52 58 10.1109/MC.2012.288
    • (2012) Computer , vol.45 , Issue.12 , pp. 52-58
    • Wang, Y.1    Streff, K.2    Raman, S.3
  • 138
    • 84897998269 scopus 로고    scopus 로고
    • Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing
    • F. Xia, F. Ding, J. Li, X. Kong, L. Yang, and J. Ma Phone2Cloud: exploiting computation offloading for energy saving on smartphones in mobile cloud computing Inf Syst Front 16 1 2014 95 111 10.1007/s10796-013-9458-1
    • (2014) Inf Syst Front , vol.16 , Issue.1 , pp. 95-111
    • Xia, F.1    Ding, F.2    Li, J.3    Kong, X.4    Yang, L.5    Ma, J.6
  • 139
    • 84877272118 scopus 로고    scopus 로고
    • Security and privacy in cloud computing
    • Z. Xiao, and Y. Xiao Security and privacy in cloud computing IEEE Commun Surv Tutor 15 2 2013 843 859
    • (2013) IEEE Commun Surv Tutor , vol.15 , Issue.2 , pp. 843-859
    • Xiao, Z.1    Xiao, Y.2
  • 140
  • 142
    • 84888848223 scopus 로고    scopus 로고
    • Software service signature (S3) for authentication in cloud computing
    • L. Xu, X. Cao, Y. Zhang, and W. Wu Software service signature (S3) for authentication in cloud computing Clust Comput 16 4 2013 1 10 10.1007/s10586-013-0262-y
    • (2013) Clust Comput , vol.16 , Issue.4 , pp. 1-10
    • Xu, L.1    Cao, X.2    Zhang, Y.3    Wu, W.4
  • 143
    • 78149314657 scopus 로고    scopus 로고
    • An ontology-supported ubiquitous interface agent for cloud computing-example on Bluetooth wireless technique with java programming
    • Qingdao, China: IEEE
    • Yang SY, Hsu CL, Lee DL. An ontology-supported ubiquitous interface agent for cloud computing-example on Bluetooth wireless technique with java programming. In: Ninth international conference on machine learning and cybernetics. Qingdao, China: IEEE; 2010. p. 2971-8.
    • (2010) Ninth International Conference on Machine Learning and Cybernetics , pp. 2971-2978
    • Yang, S.Y.1    Hsu, C.L.2    Lee, D.L.3
  • 145
    • 84907807860 scopus 로고    scopus 로고
    • Techniques to minimize state transfer costs for dynamic execution offloading in mobile cloud computing
    • S. Yang, D. Kwon, H. Yi, Y. Cho, Y. Kwon, and Y. Paek Techniques to minimize state transfer costs for dynamic execution offloading in mobile cloud computing IEEE Trans Mob Comput 13 11 2014 2648 2660 10.1109/TMC.2014.2307293
    • (2014) IEEE Trans Mob Comput , vol.13 , Issue.11 , pp. 2648-2660
    • Yang, S.1    Kwon, D.2    Yi, H.3    Cho, Y.4    Kwon, Y.5    Paek, Y.6
  • 146
    • 84893090541 scopus 로고    scopus 로고
    • Energy efficient task scheduling in mobile cloud computing
    • C.-H. Hsu, X. Li, X. Shi, R. Zheng, Springer Berlin, Heidelberg
    • D. Yao, C. Yu, H. Jin, and J. Zhou Energy efficient task scheduling in mobile cloud computing C.-H. Hsu, X. Li, X. Shi, R. Zheng, Network and parallel computing. Lecture notes in computer science vol. 8147 2013 Springer Berlin, Heidelberg 344 355 10.1007/978-3-642-40820-5-29
    • (2013) Network and Parallel Computing. Lecture Notes in Computer Science , vol.8147 , pp. 344-355
    • Yao, D.1    Yu, C.2    Jin, H.3    Zhou, J.4
  • 147
    • 84874587590 scopus 로고    scopus 로고
    • Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing
    • Xiangtan, China: IEEE
    • Yassin AA, Jin H, Ibrahim A, Zou D. Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Second international conference on cloud and green computing. Xiangtan, China: IEEE; 2012. p. 282-9. doi: http://dx.doi.org/10.1109/CGC.2012.91.
    • (2012) Second International Conference on Cloud and Green Computing , pp. 282-289
    • Yassin, A.A.1    Jin, H.2    Ibrahim, A.3    Zou, D.4
  • 148
    • 84870660462 scopus 로고    scopus 로고
    • Desktop cloud-based research on unified authentication architecture
    • Xian, China: IEEE
    • Yongqing S, Xiang Z. Desktop cloud-based research on unified authentication architecture. In: 2012 spring congress on engineering and technology. Xian, China: IEEE; 2012. p. 1-4. doi: http://dx.doi.org/10.1109/SCET.2012.6342101.
    • (2012) 2012 Spring Congress on Engineering and Technology , pp. 1-4
    • Yongqing, S.1    Xiang, Z.2
  • 149
    • 84859178298 scopus 로고    scopus 로고
    • A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices
    • E.-J. Yoon, S.-B. Choi, and K.-Y. Yoo A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices Comput Sci Eng 8 4 2012 2637 2653
    • (2012) Comput Sci Eng , vol.8 , Issue.4 , pp. 2637-2653
    • Yoon, E.-J.1    Choi, S.-B.2    Yoo, K.-Y.3
  • 152
    • 80155167231 scopus 로고    scopus 로고
    • A security framework of group location-based mobile applications in cloud computing
    • Taipei City: IEEE
    • Yu-Jia C, Li-Chun W. A security framework of group location-based mobile applications in cloud computing. In: 40th international conference on parallel processing workshops. Taipei City: IEEE; 2011. p. 184-90. http://dx.doi.org/10.1109/ICPPW.2011.6.
    • (2011) 40th International Conference on Parallel Processing Workshops , pp. 184-190
    • Yu-Jia, C.1    Li-Chun, W.2
  • 153
    • 63649131787 scopus 로고    scopus 로고
    • On the anonymity of some authentication schemes for wireless communications
    • P. Zeng, Z. Cao, K.-k. Choo, and S. Wang On the anonymity of some authentication schemes for wireless communications IEEE Commun Lett 13 3 2009 170 171 10.1109/LCOMM.2009.081821
    • (2009) IEEE Commun Lett , vol.13 , Issue.3 , pp. 170-171
    • Zeng, P.1    Cao, Z.2    Choo, K.-K.3    Wang, S.4
  • 155
    • 84905915514 scopus 로고    scopus 로고
    • A remote monitoring system based on measuring instrument cloud
    • Switzerland, Nanjing, China: Trans Tech Publications
    • Zhang J, Liu YS, Xue L. A remote monitoring system based on measuring instrument cloud. In: 4th international conference on industry, information system and material engineering. Switzerland, Nanjing, China: Trans Tech Publications; 2014. p. 525-9. http://dx.doi.org/10.4028/www.scientific.net/AMR.1014.525.
    • (2014) 4th International Conference on Industry, Information System and Material Engineering , pp. 525-529
    • Zhang, J.1    Liu, Y.S.2    Xue, L.3
  • 158
    • 66449108023 scopus 로고    scopus 로고
    • PPAB: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks
    • H. Zhu, X. Lin, M. Shi, P.-h. Ho, and X.S. Shen PPAB: a privacy-preserving authentication and billing architecture for metropolitan area sharing networks IEEE Trans Veh Technol 58 5 2009 2529 2543 10.1109/TVT.2008.2007983
    • (2009) IEEE Trans Veh Technol , vol.58 , Issue.5 , pp. 2529-2543
    • Zhu, H.1    Lin, X.2    Shi, M.3    Ho, P.-H.4    Shen, X.S.5
  • 159
    • 84918522665 scopus 로고    scopus 로고
    • Real-time tasks oriented energy-aware scheduling in virtualized clouds
    • X. Zhu, L.T. Yang, H. Chen, J. Wang, S. Yin, and X. Liu Real-time tasks oriented energy-aware scheduling in virtualized clouds IEEE Trans Cloud Comput 2 2 2014 168 180 10.1109/TCC.2014.2310452
    • (2014) IEEE Trans Cloud Comput , vol.2 , Issue.2 , pp. 168-180
    • Zhu, X.1    Yang, L.T.2    Chen, H.3    Wang, J.4    Yin, S.5    Liu, X.6
  • 160
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • D. Zissis, and D. Lekkas Addressing cloud computing security issues Future Gener Comput Syst 28 3 2012 583 592 10.1016/j.future.2010.12.006
    • (2012) Future Gener Comput Syst , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.