A cost-efficient one time password-based authentication in cloud environment using equal length cellular automata
暂无分享,去创建一个
Samiran Chattopadhyay | Anirban Kundu | Matangini Chattopadhyay | Arnab Mitra | Samiran Chattopadhyay | M. Chattopadhyay | A. Kundu | Arnab MITRA
[1] Simon S. Lam,et al. Authentification for Distributed Systems , 1992, Computer.
[2] Lars C. Wolf,et al. Secure smartphone-based registration and key deployment for vehicle-to-cloud communications , 2013, CyCAR '13.
[3] Yuehong Yin,et al. The internet of things in healthcare: An overview , 2016, J. Ind. Inf. Integr..
[4] Kim-Kwang Raymond Choo,et al. Cryptanalysis of an Improved Smartcard-based Remote Password Authentication Scheme , 2014 .
[5] Roman V. Yampolskiy,et al. Password Protected Visual Cryptography via Cellular Automaton Rule 30 , 2014, Trans. Data Hiding Multim. Secur..
[6] Christopher G. Langton,et al. Computation at the edge of chaos: Phase transitions and emergent computation , 1990 .
[7] Aaldert Compagner,et al. On the use of reducible polynomials as random number generators , 1993 .
[8] Norziana Jamil,et al. Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[9] Parimal Pal Chaudhuri,et al. Theory and Application of Equal Length Cycle Cellular Automata (ELCCA) for Enzyme Classification , 2010, ACRI.
[10] Abdul Hanan Abdullah,et al. Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System , 2013, Journal of Medical Systems.
[11] Xuan Liu,et al. Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network , 2014, KSII Trans. Internet Inf. Syst..
[12] Rocco Rongo,et al. A Parallel Cellular Automata Environment on Multicomputers for Computational Science , 1995, Parallel Comput..
[13] Klaus Sutner,et al. De Bruijn Graphs and Linear Cellular Automata , 1991, Complex Syst..
[14] Santanu Chattopadhyay,et al. Additive cellular automata : theory and applications , 1997 .
[15] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.
[16] Stefania Bandini,et al. Cellular automata: From a theoretical parallel computational model to its application to complex systems , 2001, Parallel Comput..
[17] Jerry Goldman,et al. Linear cellular automata with boundary conditions , 2001 .
[18] Hideo Fujiwara,et al. Secure and testable scan design using extended de Bruijn graphs , 2010, 2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC).
[19] Wattana Viriyasitavat,et al. Multi-criteria selection for services selection in service workflow , 2016 .
[20] Fei Tao,et al. Internet of Things in product life-cycle energy management , 2016, J. Ind. Inf. Integr..
[21] Shrisha Rao,et al. Energy-Aware Scheduling of Distributed Systems , 2014, IEEE Transactions on Automation Science and Engineering.
[22] Sugata Sanyal,et al. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques , 2012, ArXiv.
[23] Douglas A. Cenzer,et al. Sub-computable Bounded Pseudorandomness , 2013, LFCS.
[24] Kee-Young Yoo,et al. Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks , 2005, MADNES.
[25] Albert Y. Zomaya,et al. Sequential and Parallel Cellular Automata-Based Scheduling Algorithms , 2002, IEEE Trans. Parallel Distributed Syst..
[26] Vaidy S. Sunderam,et al. PVM: A Framework for Parallel Distributed Computing , 1990, Concurr. Pract. Exp..
[27] Samia Bouzefrane,et al. Middleware to Integrate Mobile Devices, Sensors and Cloud Computing , 2015, ANT/SEIT.
[28] Samiran Chattopadhyay,et al. An Analysis of Equal Length Cellular Automata (ELCA) Generating Linear Rules for Applications in Distributed Computing , 2015, J. Cell. Autom..
[29] Bernard De Baets,et al. Towards Generalized Measures Grasping CA Dynamics , 2010, ACRI.
[30] Parimal Pal Chaudhuri,et al. Cellular Automata Based Authentication (CAA) , 2002, ACRI.
[31] Chengen Wang. A multidisciplinary design and analysis environment and its application to aircraft flight dynamics analysis , 2016 .
[32] Kee-Young Yoo,et al. Authentication Based on Singular Cellular Automata , 2006, ACRI.
[33] Larry A. Dunning,et al. Privacy Preserving Data Sharing With Anonymous ID Assignment , 2013, IEEE Transactions on Information Forensics and Security.
[34] Gilles Zémor,et al. RankSign: An Efficient Signature Algorithm Based on the Rank Metric , 2014, PQCrypto.
[35] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[36] Srinivas Devadas,et al. Authenticated storage using small trusted hardware , 2013, CCSW.
[37] Anirban Kundu,et al. Random number generators: performance comparison of ELCA and MaxCA , 2014, CSI Transactions on ICT.
[38] S. Dhage,et al. Trusted platform for support services in cloud computing environment , 2012, 2012 International Conference on System Engineering and Technology (ICSET).
[39] Dan Boneh,et al. Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks , 2012, USENIX Security Symposium.
[40] Santanu Chattopadhyay,et al. An ASIC for cellular automata based message authentication , 2000, VLSI Design 2000. Wireless and Digital Imaging in the Millennium. Proceedings of 13th International Conference on VLSI Design.
[41] Wentian Li,et al. The Structure of the Elementary Cellular Automata Rule Space , 1990, Complex Syst..