Efficient RFID Authentication in Cloud Computing

Download Now
Provided by: Creative Commons
Topic: Cloud
Format: PDF
Cloud computing is one of the fastest growing segments of IT industry since the users commitments for investment and costs are in relation to usage. Social networks in cloud are used to reflect real world relationships that allow users to share information and form connections between one another, essentially creating dynamic virtual organizations. Anonymous authentication is a technique enabling users to prove they have privilege without disclosing real identities. Many existing anonymous authentication protocols assume absolute trust to the cloud provider where all private keys are stored.
Download Now

Find By Topic