Authentication in Cloud Computing Environment Using Two Factor Authentication
暂无分享,去创建一个
[1] Robert L. Grossman,et al. The Case for Cloud Computing , 2009, IT Professional.
[2] Weidong Kou,et al. Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks , 2009, IEEE Transactions on Vehicular Technology.
[3] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[4] Dan Boneh,et al. Digital Signature Standard , 2005, Encyclopedia of Cryptography and Security.
[5] Hyotaek Lim,et al. A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.
[6] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[7] Won Kim,et al. Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..
[8] Taekyoung Kwon,et al. Impersonation attacks on software-only two-factor authentication schemes , 2002, IEEE Commun. Lett..