标题
A new secure authentication scheme for cloud computing environment
作者
关键词
-
出版物
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
Volume 29, Issue 20, Pages e3864
出版商
Wiley
发表日期
2016-05-13
DOI
10.1002/cpe.3864
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Strategy Configurations of Multiple Users Competition for Cloud Service Reservation
- (2016) Chubo Liu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A secure and efficient file protecting system based on SHA3 and parallel AES
- (2016) Xiongwei Fei et al. PARALLEL COMPUTING
- A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
- (2015) Jing Mei et al. IEEE TRANSACTIONS ON COMPUTERS
- Scheduling Precedence Constrained Stochastic Tasks on Heterogeneous Cluster Systems
- (2015) Kenli Li et al. IEEE TRANSACTIONS ON COMPUTERS
- Hadoop Recognition of Biomedical Named Entity Using Conditional Random Fields
- (2015) Kenli Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
- (2015) Zhuo Hao et al. International Journal of Computers Communications & Control
- Energy-Efficient Stochastic Task Scheduling on Heterogeneous Computing Systems
- (2013) Kenli Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Designing chaotic S-boxes based on time-delay chaotic system
- (2013) Fatih Özkaynak et al. NONLINEAR DYNAMICS
- Privacy Preserving Data Sharing With Anonymous ID Assignment
- (2012) Larry A. Dunning et al. IEEE Transactions on Information Forensics and Security
- Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
- (2012) Xuefeng Liu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Secure chaotic system with application to chaotic ciphers
- (2012) Xiaomin Wang et al. INFORMATION SCIENCES
- Dynamic ID-based remote user password authentication schemes using smart cards: A review
- (2012) R. Madhusudhan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An improved dynamic ID-based remote user authentication with key agreement scheme
- (2011) Fengtong Wen et al. COMPUTERS & ELECTRICAL ENGINEERING
- Sharing cloud services: user authentication for social enhancement of home networking
- (2011) Slawomir Grzonkowski et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- Keyed hash function based on a chaotic map
- (2011) A. Kanso et al. INFORMATION SCIENCES
- Toward Secure and Dependable Storage Services in Cloud Computing
- (2011) Cong Wang et al. IEEE Transactions on Services Computing
- A view of cloud computing
- (2010) Michael Armbrust et al. COMMUNICATIONS OF THE ACM
- Hide and Seek in the Cloud
- (2010) Marjory S. Blumenthal IEEE SECURITY & PRIVACY
- The Information Assurance Practices of Cloud Computing Vendors
- (2010) Rajarshi Chakraborty et al. IT Professional
- A more efficient and secure dynamic ID-based remote user authentication scheme
- (2008) Yan-yan Wang et al. COMPUTER COMMUNICATIONS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search