共 50 条
- [21] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
- [22] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
- [23] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02): : 254 - 259
- [24] SUAS: Scalable User Authentication Scheme for Secure Accessing to Cloud-Based Environments 2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
- [25] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment SYMMETRY-BASEL, 2020, 12 (01):
- [26] A more Multifactor Secure Authentication Scheme based on graphical authentication 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 186 - 189
- [27] A secure authentication scheme based on fuzzy extractor Computer Modelling and New Technologies, 2014, 18 (12): : 46 - 55
- [28] A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (01): : 107 - 120
- [30] Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration Journal of Grid Computing, 2023, 21