Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues
暂无分享,去创建一个
[1] Markus Jakobsson,et al. Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.
[2] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[3] Dae Heon Bae. A Study on the Revision of the 'Personal Information Protection Act' and its Related Acts , 2012 .
[4] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[5] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[6] Jong Hyuk Park,et al. SSP-MCloud: A Study on Security Service Protocol for Smartphone Centric Mobile Cloud Computing , 2011 .
[7] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[8] David M'Raïhi,et al. HOTP: An HMAC-Based One-Time Password Algorithm , 2005, RFC.
[9] L. Arockiam,et al. Mobile Cloud Security Issues and Challenges: A Perspective , 2013 .
[10] Chris J. Mitchell,et al. Ubiquitous One-Time Password Service Using the Generic Authentication Architecture , 2013, Mob. Networks Appl..
[11] Weibo Gong,et al. Mobility Can Help: Protect User Identity with Dynamic Credential , 2010, 2010 Eleventh International Conference on Mobile Data Management.