A User Authentication Scheme Based on Trusted Platform for Cloud Computing
暂无分享,去创建一个
[1] Omar Cheikhrouhou,et al. An ID-based user authentication scheme for Wireless Sensor Networks using ECC , 2011, ICM 2011 Proceeding.
[2] Hyotaek Lim,et al. A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.
[3] Faraz Fatemi Moghaddam,et al. A scalable and efficient user authentication scheme for cloud computing environments , 2014, 2014 IEEE REGION 10 SYMPOSIUM.
[4] Deng-Guo Feng,et al. Direct Anonymous Attestation Based on Bilinear Maps: Direct Anonymous Attestation Based on Bilinear Maps , 2010 .
[5] Mats Näslund,et al. A Framework for Authentication and Authorization Credentials in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[6] Hui-Feng Huang,et al. Enhancement of Dynamic ID Based User Authentication for Multi-server Environment , 2012, 2012 Sixth International Conference on Genetic and Evolutionary Computing.
[7] Yan Zhang,et al. Certificateless Anonymous User Authentication Protocol for Cloud Computing , 2015, 2015 International Conference on Intelligent Transportation, Big Data and Smart City.
[8] Jia-Lun Tsai,et al. A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2015, IEEE Systems Journal.
[9] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[10] Mrudula Sarvabhatla,et al. A Secure Mutual Authentication Protocol for Cloud Computing Using Secret Sharing and Steganography , 2014, 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[11] Wei-Kuan Shih,et al. An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing , 2011, 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering.
[12] Chih-Ming Hsiao,et al. The improvement of ID-based remote user authentication scheme using bilinear pairings , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).
[13] Faraz Fatemi Moghaddam,et al. Cloud computing challenges and opportunities: A survey , 2015, 2015 1st International Conference on Telematics and Future Generation Networks (TAFGEN).
[14] C. D. Jaidhar. Enhanced mutual authentication scheme for cloud architecture , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[15] Brian Lee,et al. Towards Secure Provenance in the Cloud: A Survey , 2015, 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC).
[16] Jen-Ho Yang,et al. An ID-Based User Authentication Scheme for Cloud Computing , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[17] M. Sethumadhavan,et al. Novel mutual authentication protocol for cloud computing using secret sharing and steganography , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).
[18] Weizhong Qiang,et al. Cloud Authentication Based on Anonymous One-Time Password , 2013 .