An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications
暂无分享,去创建一个
Gunasekaran Manogaran | Naveen Chilamkurti | R. Varatharajan | Priyan Malarvizhi Kumar | Ching-Hsien Hsu | Maria Azees | Subramani Jegadeesan | N. Chilamkurti | Gunasekaran Manogaran | P. Kumar | R. Varatharajan | S. Jegadeesan | Ching-Hsien Hsu | M. Azees
[1] Aiqing Zhang,et al. Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems , 2017, IEEE Transactions on Information Forensics and Security.
[2] Athanasios V. Vasilakos,et al. On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services , 2017, IEEE Access.
[3] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[4] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[5] Vitaly Shmatikov,et al. Information Hiding, Anonymity and Privacy: a Modular Approach , 2004, J. Comput. Secur..
[6] Awais Ahmad,et al. Energy Efficient Hierarchical Resource Management for Mobile Cloud Computing , 2017, IEEE Transactions on Sustainable Computing.
[7] Qiaoyan Wen,et al. An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings , 2007 .
[8] Ashutosh Saxena,et al. A novel remote user authentication scheme using bilinear pairings , 2006, Comput. Secur..
[9] Victor I. Chang,et al. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks , 2017, Cluster Computing.
[10] Choong Seon Hong,et al. Bilinear-pairing-based remote user authentication schemes using smart cards , 2009, ICUIMC '09.
[11] Ashok Kumar Das,et al. Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services , 2017, IEEE Internet of Things Journal.
[12] Ashutosh Saxena,et al. An improved bilinear pairing based remote user authentication scheme , 2009, Comput. Stand. Interfaces.
[13] Cheikh Brahim Ould Mohamed El Moctar,et al. A survey of security challenges in cloud computing , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[14] Alessandro Armando,et al. An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations , 2013, Comput. Secur..
[15] Pandi Vijayakumar,et al. EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.
[16] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[17] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[18] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[19] Matthew J. B. Robshaw,et al. On Identity-Based Cryptography and Grid Computing , 2004, International Conference on Computational Science.
[20] Xing Zhang,et al. A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications , 2017, IEEE Access.
[21] P. Vijayakumar,et al. CEKD: Computationally Efficient Key Distribution Scheme for Vehicular Ad-Hoc Networks , 2016 .
[22] Matthew J. B. Robshaw,et al. A Dynamic Key Infrastructure for Grid , 2005, EGC.
[23] Hua Zhang,et al. A novel remote user authentication and key agreement scheme for mobile client-server environment , 2013 .
[24] Pascal Urien,et al. An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards , 2010, 2010 Fifth International Conference on Digital Telecommunications.