A Secure Key for Cloud using Threshold Cryptography in Kerberos
暂无分享,去创建一个
[1] Andrés Marín López,et al. Enhancing privacy and dynamic federation in IdM for consumer cloud computing , 2012, IEEE Transactions on Consumer Electronics.
[2] Chih-Yuan Huang,et al. Authentication using graphical password in cloud , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[3] Jie Wu,et al. Secure Locking for Untrusted Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[4] Suziah Sulaiman,et al. Trusted Computing based open environment user authentication model , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[5] Sushmita Ruj,et al. Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[6] Sajjad Haider,et al. Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[7] Dharmender Singh Kushwaha,et al. An Efficient Schema Shared Approach for Cloud Based Multitenant Database with Authentication and Authorization Framework , 2011, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[8] Yi Lin,et al. Ensure Data Security in Cloud Storage , 2011, 2011 International Conference on Network Computing and Information Security.
[9] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[10] Gail-Joon Ahn,et al. SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[11] K. Venkat Rao,et al. Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[12] M.R. Tribhuwan,et al. Ensuring Data Storage Security in Cloud Computing through Two-Way Handshake Based on Token Management , 2010, 2010 International Conference on Advances in Recent Technologies in Communication and Computing.
[13] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[14] Jin-Mook Kim,et al. A Secure Authentication Protocol for Cloud Services , 2011 .
[15] Athanasios V. Vasilakos,et al. SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[16] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[17] G. Clark,et al. Reference , 2008 .
[18] Yongge Wang,et al. Secure Key Distribution for the Smart Grid , 2012, IEEE Transactions on Smart Grid.
[19] Ashish G. Revar,et al. Securing user authentication using single sign-on in Cloud Computing , 2011, 2011 Nirma University International Conference on Engineering.