共 50 条
- [31] UAA: User Authentication Agent for Managing User Identities in Cloud Computing Environments [J]. 2014 IEEE 5TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC), 2014, : 208 - 212
- [32] Security Implementation in cloud computing Using User Behaviour Profiling and Decoy Technology [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 471 - 474
- [34] An ID-Based User Authentication Scheme for Cloud Computing [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
- [36] A Scalable and Efficient User Authentication Scheme for Cloud Computing Environments [J]. 2014 IEEE REGION 10 SYMPOSIUM, 2014, : 508 - 513
- [37] Research on model of user behavior habit authentication in cloud computing [J]. Guo, F. (313919864@qq.com), 1600, Huazhong University of Science and Technology (41):
- [38] A User Authentication Scheme Based on Trusted Platform for Cloud Computing [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
- [40] UCAP: a PCL secure user authentication protocol in cloud computing [J]. Tongxin Xuebao/Journal on Communications, 2018, 39 (08): : 94 - 105