• No results found

Authentication Scheme in Cloud Computing Environment

N/A
N/A
Protected

Academic year: 2020

Share "Authentication Scheme in Cloud Computing Environment"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 3. Effects of changing key size
Fig. 5. Comparison the time of user authentication between the proposed model  and ordinary user authentication

References

Related documents