Authentication scheme for insecure networks in cloud computing | IEEE Conference Publication | IEEE Xplore