An Extensive Survey on Data Authentication Schemes in Cloud Computing
暂无分享,去创建一个
[1] L. Arockiam,et al. A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing , 2014 .
[2] Ahmed A. Abdel-Hafez,et al. Secure and Efficient Authentication Scheme for Cloud Computing , 2016 .
[3] R. H. Goudar,et al. Cloud Computing - Research Issues, Challenges, Architecture, Platforms and Applications: A Survey , 2012 .
[4] Qi Luo,et al. Cloud-Based Lightweight RFID Mutual Authentication Protocol , 2017, 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC).
[5] Ambrosio Toval,et al. Security in cloud computing: A mapping study , 2015 .
[6] Bhavani Shankar,et al. Study of security issues in cloud computing , 2011 .
[7] Supriya Mandhare,et al. An intelligent approach for data fortification in cloud computing , 2014, 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014).
[8] Fahd M. Al-Dosari,et al. A Secure Cloud Computing Model based on Data Classification , 2015, ANT/SEIT.
[9] Wentao Liu,et al. Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[10] Sushmita Ruj,et al. Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[11] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[12] Saudi Arabia. Securing Mobile Cloud Using Finger Print Authentication , 2013 .
[13] Monika Bansal,et al. Deployment of secure sharing: Authenticity and authorization using cryptography in cloud environment , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.
[14] Hyotaek Lim,et al. A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.
[15] Mohammed Bakri Bashir,et al. Multilevel Authentication Scheme for Cloud Computing , 2016 .
[16] Manpreet Kaur,et al. A Review of Cloud Computing Security Issues , 2015 .
[17] M. Mrinalni Vaknishadh,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .
[18] Karandeep Kaur,et al. A Review of Cloud Computing Service Models , 2016 .
[19] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.
[20] Manas Ranjan Patra,et al. Cloud Computing: Security Issues and Research Challenges , 2011 .
[21] Atulay Mahajan,et al. The Malicious Insiders Threat in the Cloud , 2015 .
[22] S. Nalini,et al. MLA scheme: Multi-level authentication for data in cloud using NTP-server and biometric , 2016, 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).
[23] H. S. Fadewar,et al. Authentication scheme for insecure networks in cloud computing , 2016, 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC).
[24] Di Liu,et al. A Research on Cloud Computing Security , 2013, 2013 International Conference on Information Technology and Applications.