A Study of Security Authentication for Cloud Computing Based on Smart Phone
Vol. 37, No. 11, pp. 1027-1035, Nov. 2012
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
Y. Jeong and Y. Kim, "A Study of Security Authentication for Cloud Computing Based on Smart Phone," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 11, pp. 1027-1035, 2012. DOI: .
[ACM Style]
Yoon-Su Jeong and Yong-Tae Kim. 2012. A Study of Security Authentication for Cloud Computing Based on Smart Phone. The Journal of Korean Institute of Communications and Information Sciences, 37, 11, (2012), 1027-1035. DOI: .
[KICS Style]
Yoon-Su Jeong and Yong-Tae Kim, "A Study of Security Authentication for Cloud Computing Based on Smart Phone," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 11, pp. 1027-1035, 11. 2012.