Advanced Secure User Authentication Framework for Cloud Computing
暂无分享,去创建一个
[1] Hung-Yu Chien,et al. An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..
[2] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[3] Wei-Kuan Shih,et al. Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards , 2009, Comput. Commun..
[4] C.-C. Jay Kuo,et al. Multimedia storage security in cloud computing: An overview , 2011, 2011 IEEE 13th International Workshop on Multimedia Signal Processing.
[5] Chris J. Mitchell,et al. Limitations of challenge-response entity authentication , 1989 .
[6] Min-Shiang Hwang,et al. A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[7] Gail-Joon Ahn,et al. SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[8] Hyotaek Lim,et al. A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.
[9] Joshua D. Guttman,et al. Authentication tests and the structure of bundles , 2002, Theor. Comput. Sci..
[10] Tzung-Her Chen,et al. A novel user-participating authentication scheme , 2010, J. Syst. Softw..
[11] Joshua D. Guttman,et al. Strand Spaces: Proving Security Protocols Correct , 1999, J. Comput. Secur..
[12] Cheng-Chi Lee,et al. A password authentication scheme over insecure networks , 2006, J. Comput. Syst. Sci..
[13] Wei-Chi Ku,et al. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[14] Carl K. Chang,et al. Computer software and applications , 2010, J. Syst. Softw..
[15] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[16] Cheng-Chi Lee,et al. A Robust Remote User Authentication Scheme Using Smart Card , 2011, Inf. Technol. Control..
[17] Chien-Ming Chen,et al. Cryptanalysis of a Variant of Peyravian-Zunic's Password Authentication Scheme , 2003 .
[18] W. Marsden. I and J , 2012 .