[1] |
陈康, 郑纬民 . 云计算:系统实例与研究现状[J]. 软件学报, 2009,20(5): 1337-1348. CHEN K , ZHENG W M . Cloud computing:system instances and current research[J]. Journal of Software, 2009,20(5): 1337-1348.
|
[2] |
罗军舟, 金嘉晖, 宋爱波 ,等. 云计算:体系架构与关键技术[J]. 通信学报, 2011,32(7): 3-21. LUO J Z , JIN J H , SONG A B ,et al. Cloud computing:architecture and key technologies[J]. Journal on Communications, 2011,32(7): 3-21.
|
[3] |
冯登国, 张敏, 张妍 ,等. 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83. FENG D G , ZHANG M , ZHANG Y ,et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[4] |
冯登国, 秦宇, 汪丹 ,等. 可信计算技术研究[J]. 计算机研究与发展, 2011,48(8): 1332-1349. FENG D G , QIN Y , WANG D ,et al. Research on trusted computing technology[J]. Journal of Computer Research and Development, 2011,48(8): 1332-1349.
|
[5] |
Towards trusted cloud computing[EB/OL]. , 2009.
|
[6] |
徐贤, 龙宇, 毛贤平 . 基于TPM的强身份认证协议研究[J]. 计算机工程, 2012,38(4): 23-27. XU X , LONG Y , MAO X P . Research on TPM based strong ID authentication protocol[J]. Computer Engineering, 2012,38(4): 23-27.
|
[7] |
杨力, 马建峰 . 可信的智能卡口令双向认证方案[J]. 电子科技大学学报, 2011,40(1): 128-133. YANG L , MA J F . Trusted mutual authentication scheme with smart cards and passwords[J]. Journal of University of Electronic Science and Technology of China, 2011,40(1): 128-133.
|
[8] |
CHEN T H , HSIANG H C , SHIH W K . Security enhancement on an improvement on two remote user authentication schemes using smart cards[J]. Future Generation Computer Systems, 2011,27(4): 377-380.
|
[9] |
JUANG W S . Efficient password authenticated key agreement using smart card[J]. Computer and Security, 2004,23(2): 167-173.
|
[10] |
FAN C I , LIN Y H , HSU R H . Remote password authentication scheme with smart cards and biometrics[A]. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM ′ 06)[C]. San Francisco,CA,USA, 2006. 1-5.
|
[11] |
SANTHOSH B S , GOKULRAJ K . An enhanced dynamic mutual authentication scheme for smart card based networks[J]. Computer Network and Information Security, 2012,4(4): 30-38.
|