1 |
Khan A N , Kiah M L M , Khan S U , et al. Towards secure mobile cloud computing:a survey. Future Generation Computer Systems, 2012, 25 (8): 1~22
|
2 |
Singh M , Singh S . Design and implementation of multi-tier authentication scheme in cloud. International Journal of Computer Science Issues, 2012, 9 (5): 181~187
|
3 |
Yassin A A , Jin H , Ibrahim A , et al. Efficient password-based two factors authentication in cloud computing. International Journal of Security and Its Applications, 2012, 6 (2): 143~148.
|
4 |
田立勤, 刘飞飞 . 基于双滑动窗口的用户行为信任评估机制. 清华大学学报(自然科学版), 2010, 50 (5): 763~767.
|
5 |
刘宴兵, 刘飞飞 . 基于云计算的智能手机社交认证系统. 通信学报, 2012, 33 (Z1): 28~34.
|
6 |
Senk C , Dotzler F . Biometric authentication as a service for enterprise identity management deployment. Proceedings of International Conference on Availabi1ity, Reliability and Security, Regensburg, Germany 2011: 43~50
|
7 |
Zhang Q , Li Y , Song D , et al. Alliance-authentication protocol in clouds computing environment. China Communications, 2012, 9 (7): 42~54.
|
8 |
Zhang Q , Zheng J , Tan Y , et al. Cross-domain authentication alliance protocol based on isomorphic groups. Journal of Computers, 2012, 6 (4): 650~656.
|
9 |
Kim J , Hong S . A consolidated authentication model in cloud computing environments. Journal of Computers, 2012, 7 (3): 151~160.
|