共 50 条
- [42] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
- [45] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA [J]. 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
- [46] A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments [J]. Journal of Medical Systems, 2016, 40
- [47] A Cloud-Based Secure Authentication Protocol for Contactless-NFC Payment [J]. 2015 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2015, : 328 - 330
- [48] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815
- [50] A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 843 - 848