共 50 条
- [42] User's Behavior Trust Evaluate Algorithm Based On Cloud Model 2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 555 - 560
- [43] An ID-Based User Authentication Scheme for Cloud Computing 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
- [45] Biometric based User Authentication Protocol for Mobile Cloud Environment 2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
- [47] Research on User Safety Authentication Based on Biometrics in Cloud Manufacturing ADVANCED HYBRID INFORMATION PROCESSING, 2018, 219 : 50 - 55
- [48] A User Authentication Scheme Based on Trusted Platform for Cloud Computing SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
- [49] Detecting Latent Terrorist Communities Testing a Gower's Similarity-Based Clustering Algorithm for Multi-partite Networks COMPLEX NETWORKS AND THEIR APPLICATIONS VII, VOL 1, 2019, 812 : 292 - 303