Cited By
View all- Alomar NAlsaleh MAlarifi A(2017)Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic ReviewIEEE Communications Surveys & Tutorials10.1109/COMST.2017.265174119:2(1080-1111)Online publication date: Oct-2018
- Rossi FCalheiros RDe Rose C(2017)A Terminology to Classify Artifacts for Cloud InfrastructureResearch Advances in Cloud Computing10.1007/978-981-10-5026-8_4(75-92)Online publication date: 28-Dec-2017
- Nagar NSuman U(2016)Two Factor Authentication Using M-Pin Server for Secure Cloud Computing EnvironmentWeb-Based Services10.4018/978-1-4666-9466-8.ch046(1053-1066)Online publication date: 2016
- Show More Cited By