Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols

0
1005
Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols

Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols

Abstract

Smart technologies, such as smartphones, play dynamic roles to complete our daily routines and official tasks successfully requiring access to all types of critical data. Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols Securing critical information was quite a challenge before the advent of these smart technologies. However, information security has become one of the primary and most fundamental tasks for security professionals after the advent and global adoption of such technologies. Social media integration has made this task even more challenging to be successful.
 
Advantages
  • We then show that the proposed solution reduces the computational complexity  while preserving optimality in most of the 3D scenes. We finally provide simulation results for different classes of users and show the gain offered by an  optimal multi-view video representation selection compared to recommended  representation sets (e.g., Netflix and Apple ones) or to a baseline representation  selection algorithm where the encoding parameters are decided a priori for all the  camera views.
 
Disadvantages
  • Each representation is then decomposed into temporal chunks (usually 2s long) and  then stored at the server. When a client requests a specific multi-view video, it receives a media presentation description (MPD) file from the server, which  contains information about the available representations for each anchor view.