Distributed Authentication in the Cloud Computing Environment
暂无分享,去创建一个
Zhi Li | Yanzhu Liu | Yuxia Sun | Yuxia Sun | Zhi Li | Yanzhu Liu
[1] Sufyan T. Faraj Al-Janabi,et al. Public-Key Cryptography Enabled Kerberos Authentication , 2011, 2011 Developments in E-systems Engineering.
[2] Gerard Briscoe,et al. Community Cloud Computing , 2009, CloudCom.
[3] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[4] Balachander Krishnamurthy,et al. Privacy awareness about information leakage: who knows what about me? , 2013, WPES.
[5] Chundong Wang,et al. Security Analysis and Improvement for Kerberos Based on Dynamic Password and Diffie-Hellman Algorithm , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.
[6] Ping Yang,et al. Improvement of Kerberos protocol based on dynamic password and “One-time public key” , 2014, 2014 10th International Conference on Natural Computation (ICNC).
[7] Dengguo Feng,et al. Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .
[8] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[9] Nitin Gautam,et al. Replay Attack Prevention in Kerberos Authentication Protocol Using Triple Password , 2013, ArXiv.
[10] Radhika M. Pai,et al. Modeling and Verification of Kerberos Protocol Using Symbolic Model Verifier , 2011, 2011 International Conference on Communication Systems and Network Technologies.
[11] Khaled Elleithy,et al. Effect of Temperature on The Performance of a Cylindrical Microstrip Printed Antenna for Tm01 Mode Using Different Substrates , 2011 .
[12] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[13] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[14] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[15] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[16] Zhang Min,et al. Study on Cloud Computing Security , 2011 .
[17] Ahmed Atwan,et al. Mobile agents' authentication using a proposed light Kerberos system , 2014, 2014 9th International Conference on Informatics and Systems.