Publication | Closed Access
Considerations for mobile authentication in the Cloud
12
Citations
4
References
2011
Year
Authentication AuthorizationMobile SecurityEngineeringInformation SecurityCloud ComputingAuthenticationMobile ComputingMobile AuthenticationAuthentication ProtocolData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1