1. Authentication in mobile cloud computing;Abolfazli;J. Netw. Comput. Appl.,2016
2. User-authentication approach for data security between smartphone and cloud;Al-Hasan,2013
3. Security with low communication overhead;Beaver,1990
4. High-bandwidth encryption with low-bandwidth smartcards;Blaze,1996
5. A formal treatment of remotely keyed encryption;Blaze,1999