{"id":"https://openalex.org/W3137711985","doi":"https://doi.org/10.1007/s40747-021-00305-0","title":"Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment","display_name":"Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment","publication_year":2021,"publication_date":"2021-03-11","ids":{"openalex":"https://openalex.org/W3137711985","doi":"https://doi.org/10.1007/s40747-021-00305-0","mag":"3137711985"},"language":"en","primary_location":{"id":"doi:10.1007/s40747-021-00305-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-021-00305-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00305-0.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00305-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002743570","display_name":"Dilip Venkata Kumar Vengala","orcid":"https://orcid.org/0000-0001-8795-3696"},"institutions":[{"id":"https://openalex.org/I52035452","display_name":"Jawaharlal Nehru Technological University Anantapur","ror":"https://ror.org/02rw39616","country_code":"IN","type":"education","lineage":["https://openalex.org/I52035452"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Dilip Venkata Kumar Vengala","raw_affiliation_strings":["Department of Computer Science and Engineering, JNTUA, Anantapur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, JNTUA, Anantapur, India","institution_ids":["https://openalex.org/I52035452"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085364534","display_name":"D. Kavitha","orcid":"https://orcid.org/0000-0002-2085-368X"},"institutions":[{"id":"https://openalex.org/I4210134386","display_name":"G Pulla Reddy Dental College & Hospital","ror":"https://ror.org/04p93kz40","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210134386"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. Kavitha","raw_affiliation_strings":["Department of Computer Science and Engineering, G.Pulla Reddy Engineering College, Kurnool, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, G.Pulla Reddy Engineering College, Kurnool, India","institution_ids":["https://openalex.org/I4210134386"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103959673","display_name":"A. P. Siva Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I52035452","display_name":"Jawaharlal Nehru Technological University Anantapur","ror":"https://ror.org/02rw39616","country_code":"IN","type":"education","lineage":["https://openalex.org/I52035452"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"A. P. Siva Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, JNTUA College of Engineering, Anantapur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, JNTUA College of Engineering, Anantapur, India","institution_ids":["https://openalex.org/I52035452"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002743570"],"corresponding_institution_ids":["https://openalex.org/I52035452"],"apc_list":{"value":1320,"currency":"GBP","value_usd":1619},"apc_paid":{"value":1320,"currency":"GBP","value_usd":1619},"fwci":3.4129,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.93062712,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"9","issue":"3","first_page":"2915","last_page":"2928"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7828813791275024},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.762029767036438},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7503058910369873},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.692241907119751},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6261916160583496},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5995325446128845},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5431721210479736},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.44867420196533203},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43956196308135986},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21364447474479675}],"concepts":[{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7828813791275024},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.762029767036438},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7503058910369873},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.692241907119751},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6261916160583496},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5995325446128845},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5431721210479736},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.44867420196533203},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43956196308135986},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21364447474479675}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s40747-021-00305-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-021-00305-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00305-0.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3fc564d69d1e4b718c055c96829b8b38","is_oa":true,"landing_page_url":"https://doaj.org/article/3fc564d69d1e4b718c055c96829b8b38","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Complex & Intelligent Systems, Vol 9, Iss 3, Pp 2915-2928 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s40747-021-00305-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-021-00305-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00305-0.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3137711985.pdf","grobid_xml":"https://content.openalex.org/works/W3137711985.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1586264864","https://openalex.org/W2020182173","https://openalex.org/W2131646073","https://openalex.org/W2225750049","https://openalex.org/W2303801456","https://openalex.org/W2322203259","https://openalex.org/W2553162730","https://openalex.org/W2556536142","https://openalex.org/W2557515658","https://openalex.org/W2563865490","https://openalex.org/W2575382648","https://openalex.org/W2605738864","https://openalex.org/W2607368294","https://openalex.org/W2613668921","https://openalex.org/W2735248305","https://openalex.org/W2765140999","https://openalex.org/W2783317467","https://openalex.org/W2792220701","https://openalex.org/W2796624615","https://openalex.org/W2798303797","https://openalex.org/W2800426337","https://openalex.org/W2902273535","https://openalex.org/W2968543789","https://openalex.org/W2990048441","https://openalex.org/W2995309549","https://openalex.org/W2997522935"],"related_works":["https://openalex.org/W2946255556","https://openalex.org/W1996899447","https://openalex.org/W3202072339","https://openalex.org/W2621974100","https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2547137208"],"abstract_inverted_index":{"Abstract":[0],"Cloud":[1],"computing":[2],"(CC)":[3],"is":[4,143,150,180],"a":[5,57,103,111],"technology":[6],"that":[7,189],"delivers":[8],"its":[9],"service":[10],"by":[11],"means":[12],"of":[13,42,56],"the":[14,17,40,50,54,116,134,137,147,155,160,169,174,177,183,190,197],"internet.":[15],"In":[16,133,173],"modern":[18],"scenario,":[19],"cloud":[20,27,34,118,170],"storage":[21],"services":[22],"have":[23],"gained":[24],"attention.":[25],"The":[26,120,186],"environment":[28],"confronts":[29],"data":[30,108,127,131,149],"breaches":[31],"expansively":[32],"in":[33,44,115],"storage,":[35],"which":[36,84],"might":[37],"bring":[38],"about":[39],"disclosure":[41],"personal":[43],"addition":[45],"to":[46,88,168],"corporate":[47],"data.":[48],"Thus,":[49],"requirement":[51],"arises":[52],"for":[53],"creation":[55],"more":[58],"foremost":[59],"authentication":[60,63,113,135],"system.":[61],"Customary":[62],"schemes":[64],"depend":[65],"on":[66,154],"techniques,":[67],"like":[68],"Password":[69],"Authentications":[70],"Protocol":[71],"(PAP),":[72],"Challenge":[73],"Handshakes":[74],"Authentication":[75],"Protocols":[76],"(CHAP),":[77],"as":[78,80,91,93],"well":[79,92],"One-Time":[81],"Pads":[82],"(OTP),":[83],"are":[85],"often":[86],"susceptible":[87],"malevolent":[89],"attacks":[90],"security":[94,195],"threats.":[95],"To":[96],"shun":[97],"such":[98],"issues,":[99],"this":[100],"paper":[101],"proposed":[102,121,178,191],"Modified":[104],"ECC":[105],"centred":[106],"secure":[107],"transfer":[109],"and":[110,129,163],"\u20183\u2019-factor":[112],"scheme":[114],"untrusted":[117],"environment.":[119],"work":[122,179,192],"comprises":[123],"\u20183\u2019":[124],"steps:":[125],"authentication,":[126],"compression,":[128],"safe":[130],"transfer.":[132],"phase,":[136],"SHA-512":[138],"algorithm":[139],"along":[140],"with":[141,182],"CCP":[142],"utilized.":[144],"After":[145],"that,":[146],"user-uploaded":[148],"compressed":[151,161],"utilizing":[152],"CHA":[153],"server-side.":[156],"Next,":[157],"MECC":[158],"encrypts":[159],"data,":[162],"then,":[164],"safely":[165],"uploaded":[166],"it":[167],"server":[171],"(CS).":[172],"investigational":[175],"appraisal,":[176],"contrasted":[181],"prevailing":[184,198],"methods.":[185,199],"outcomes":[187],"proved":[188],"renders":[193],"better":[194],"than":[196]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":6}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
