An ID-Based User Authentication Scheme for Cloud Computing
暂无分享,去创建一个
[1] Wang Bin,et al. Open Identity Management Framework for SaaS Ecosystem , 2009, 2009 IEEE International Conference on e-Business Engineering.
[2] Toshiya Itoh,et al. An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..
[3] Gwoboa Horng,et al. Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem , 2005, IEICE Trans. Commun..
[4] Yan-yan Wang,et al. A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..
[5] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[6] Dongho Won,et al. Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol , 2009 .
[7] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[8] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[9] Geng Yang,et al. Secure Document Service for Cloud Computing , 2009, CloudCom.
[10] Tzonelih Hwang,et al. Identity-based conference key broadcast systems , 1994 .
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.