Identity based secure authentication scheme based on quantum key distribution for cloud computing
暂无分享,去创建一个
[1] Yuh-Min Tseng,et al. RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE , 2014, Informatica.
[2] Nahid Shahmehri,et al. Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[3] Shi-Jinn Horng,et al. Quantum direct communication with mutual authentication , 2009, Quantum Inf. Comput..
[4] Xin Jia,et al. A Quantum Protocol for (t,n)-Threshold Identity Authentication Based on Greenberger-Horne-Zeilinger States , 2013 .
[5] Takashi Mihara,et al. Quantum identification schemes with entanglements , 2002 .
[6] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[7] Yi-you Nie,et al. Quantum Secure Direct Communication Based on Four-Qubit Cluster States , 2013 .
[8] Chen Yuan,et al. Quantum Authentication Scheme Based on Entanglement Swapping , 2016 .
[9] Gan Gao,et al. Quantum Secure Direct Communication by Swapping Entanglements of 3×3-Dimensional Bell States , 2011 .
[10] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[11] Ping Zhou,et al. Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state , 2005, quant-ph/0511223.
[12] Helen D. Karatza,et al. Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values , 2011, J. Syst. Softw..
[13] Sakshi Kaushal,et al. Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.
[14] Dongyang Long,et al. Quantum Secure Direct Communication with Two-Photon Four-Qubit Cluster States , 2012, International Journal of Theoretical Physics.
[15] Xiang-Yang Li,et al. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption , 2015, IEEE Trans. Inf. Forensics Secur..
[16] Kyo Inoue,et al. Generation of 1.5-μm band time-bin entanglement using spontaneous fiber four-wave mixing and planar light-wave circuit interferometers , 2005 .
[17] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[18] Yuh-Min Tseng,et al. Efficient Revocable ID-Based Encryption with a Public Channel , 2012, Comput. J..
[19] Kevin Curran,et al. Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..
[20] C. D. Jaidhar. Enhanced mutual authentication scheme for cloud architecture , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[21] Wei Jiang,et al. High-Capacity Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom , 2012, International Journal of Theoretical Physics.
[22] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[23] Shraddha M. Gurav,et al. Graphical Password Authentication: Cloud Securing Scheme , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.
[24] H. Takesue,et al. Frequency and Polarization Characteristics of Correlated Photon-Pair Generation Using a Silicon Wire Waveguide , 2010, IEEE Journal of Selected Topics in Quantum Electronics.
[25] Fuguo Deng,et al. Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement , 2005, quant-ph/0501129.
[26] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[27] H. Takesue,et al. Entanglement generation using silicon wire waveguide , 2008, 2008 5th IEEE International Conference on Group IV Photonics.
[28] T. Tsuchizawa,et al. Low loss mode size converter from 0.3 /spl mu/m square Si wire waveguides to singlemode fibres , 2002 .
[29] Hwayean Lee,et al. Quantum direct communication with authentication , 2005, quant-ph/0512051.
[30] Athanasios V. Vasilakos,et al. A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing , 2012, IEEE Transactions on Network and Service Management.
[31] Liu Dan,et al. A New Quantum Secure Direct Communication Scheme with Authentication , 2010 .
[32] Zhan-jun Zhang. Comment on : Quantum direct communication with authentication , 2006, quant-ph/0604125.
[33] Matthew N. O. Sadiku,et al. Cloud Computing: Opportunities and Challenges , 2014, IEEE Potentials.
[34] Genshe Chen,et al. Information fusion in a cloud computing era: A systems-level perspective , 2014, IEEE Aerospace and Electronic Systems Magazine.
[35] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[36] Hai Jin,et al. A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.
[37] Haider Abbas,et al. Cloud Computing Risk Assessment: A Systematic Literature Review , 2014 .
[38] Mosayeb Naseri. AN EFFICIENT PROTOCOL FOR QUANTUM SECURE DIALOGUE WITH AUTHENTICATION BY USING SINGLE PHOTONS , 2011 .
[39] Jörg Rothe,et al. Some facets of complexity theory and cryptography: A five-lecture tutorial , 2001, CSUR.
[40] Sheetal Kalra,et al. Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..
[41] Yuh-Min Tseng,et al. Provably secure revocable ID-based signature in the standard model , 2013, Secur. Commun. Networks.
[42] H. Takesue,et al. Observation of 1.5 μm band entanglement using single photon detectors based on sinusoidally gated InGaAs/InP avalanche photodiodes , 2009 .
[43] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems a Cloud Based Health Insurance Plan Recommendation System: a User Centered Approach , 2022 .
[44] John C. Henderson,et al. Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing , 2010, MIS Q. Executive.
[45] Jeffrey Soar,et al. Challenges and Issues Within Cloud Computing Technology , 2014, CLOUD 2014.
[46] Hyotaek Lim,et al. A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.