[1] |
PATI M , RAO G R . Integrity verification in multi-cloud storage using cooperative provable data possession[J]. International Journal of Computer Science and Information Technologies(IJCSIT), 2014,5(2): 982-985.
|
[2] |
CHATURVEDI A , DAS A K , MISHRA D ,et al. Design of a secure smart card-based multi-server authentication scheme[J]. Journal of Information Security and Applications, 2016,30: 64-80.
|
[3] |
LI H , DAI Y , TIAN L ,et al. Identity-based authentication for cloud computing[M]. Cloud Computing. Springer Berlin Heidelberg, 2009: 157-166.
|
[4] |
ZHANG Q , LI Y Z , SONG D J.et al . Alliance-authentication protocol in cloud computing environment[J]. China Communications, 2012,7: 42-54.
|
[5] |
CHEN T H , YEH H L.SHIH W K . An advanced ECC dynamic ID-based remote mutual authentication scheme for cloud computing[C]// 5th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE). 2011: 155-159.
|
[6] |
YASSIN A , JIN H , IBRAHIM A ,et al. A practical privacy-preserving password authentication scheme for cloud computing[C]// 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops and PhD Forum. 2012: 21-25.
|
[7] |
JAIDHAR D , . Enhanced mutual authentication scheme for cloud architecture[C]// 2013 IEEE 3rd International Advance Computing Conference (IACC). 2013: 70-77.
|
[8] |
CHOKSI S . Comparative study on authentication schemes for cloud computing[J]. International Journal of Engineering Development and Research(JIEDR), 2014,2(2): 1-7.
|
[9] |
SINGH A , CHATTERJEE K . A secure multi-tier authentication scheme in cloud computing environment[C]// 2015 International Conference on Circuit,Power and Computing Technologies (ICCPCT). 2015: 2-8.
|
[10] |
MEDHIOUB M , HAMDI M , KIM T . A new authentication scheme for cloud-based storage applications[C]// The 9th International Conference on Security of Information and Networks. 2016: 57-60.
|
[11] |
KAUR R , KAUR A . Enhancing authentication schemes for multi-level graphical password in cloud environment,communications on applied electronics (CAE)[C]// Foundation of Computer Science FCS. 2016: 12-18.
|
[12] |
LEE J , SON J , KIM H ,et al. An authentication scheme for providing to user service transparency in multicloud environment[J]. Journal of the Korea Institute of Information Security and Cryptology, 2013,23(6): 1131-1141.
|
[13] |
KIM H , CHUNG H , KANG J . Zero-knowledge authentication for secure multi-cloud computing environments[C]// Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, 2015: 255-261.
|
[14] |
田俊峰, 孙可辉 . 基于 HIBC 的云信任分散统一认证机制[J]. 计算机研究与发展, 2015,52(7): 1660-1671.
|
|
TIAN J F , SUN K H . Trusted-distributed-based authentication mechanism using hierarchical identity-based cryptography[J]. Journal of Computer Research and Development, 2015,52(7): 1660-1671.
|
[15] |
周艺华, 蒿金志, 赵航 . 混合云服务中的跨云际认证机制[J]. 计算机系统应用, 2015,24(4): 118-122.
|
|
ZHOU Y H , HAO J Z , ZHAO H . Authentication mechanism of crossing clouds in hybrid cloud services[J]. Computer Systems and Applications, 2015,24(4): 118-122.
|
[16] |
BONG J , SUH Y , SHIN Y . Fast user authentication method considering mobility in multi-clouds[C]// 2016 International Conference on Information Networking (ICOIN). 2016: 445-448.
|
[17] |
TSAD J L , LO N W . A privacy-aware authentication scheme for distributed mobile cloud computing services[J]. IEEE Systems Journal, 2015,9(3): 1-11.
|
[18] |
CORON J S , DODIS Y , MALINAUD C ,et al. Merkle-Damg?rd revisited:How to construct a hash function[C]// Advances in Cryptology-CRYPTO 2005. 2005: 430-448.
|
[19] |
REN S Q , TAN B H , SUNDARAM S ,et al. Secure searching on cloud storage enhanced by homomorphic indexing[J]. Future Generation Computer Systems, 2016,65: 102-110.
|
[20] |
ADE-IBIJOLA O . A simulated enhancement of Fisher-Yates algorithm for shuffling in virtual card games using domain-specific data structures[J]. International Journal of Computer Applications, 2012,54(11): 24-28.
|