
Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
Abstract
Smart technologies, such as smartphones, play dynamic roles to complete our daily routines and official tasks successfully requiring access to all types of critical data. Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols Securing critical information was quite a challenge before the advent of these smart technologies. However, information security has become one of the primary and most fundamental tasks for security professionals after the advent and global adoption of such technologies. Social media integration has made this task even more challenging to be successful.
Advantages
- We then show that the proposed solution reduces the computational complexity while preserving optimality in most of the 3D scenes. We finally provide simulation results for different classes of users and show the gain offered by an optimal multi-view video representation selection compared to recommended representation sets (e.g., Netflix and Apple ones) or to a baseline representation selection algorithm where the encoding parameters are decided a priori for all the camera views.
Disadvantages
- Each representation is then decomposed into temporal chunks (usually 2s long) and then stored at the server. When a client requests a specific multi-view video, it receives a media presentation description (MPD) file from the server, which contains information about the available representations for each anchor view.