共 50 条
- [21] A Key Management Scheme Based on Hypergraph for Fog Computing [J]. CHINA COMMUNICATIONS, 2018, 15 (11) : 158 - 170
- [22] New User Authentication and Key Management Scheme for Secure Data Transmission in Wireless Mobile Multicast [J]. PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE INTERNET TECHNOLOGIES AND APPLICATIONS (ITA), 2017, : 264 - 269
- [23] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
- [25] Secure deduplication with reliable and revocable key management in fog computing [J]. Peer-to-Peer Networking and Applications, 2019, 12 : 850 - 864
- [27] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
- [28] Lightweight Secure Authentication and Key Distribution Scheme for Vehicular Cloud Computing [J]. SYMMETRY-BASEL, 2021, 13 (03):
- [29] Biometric-Kerberos Authentication Scheme for Secure Mobile Computing Services [J]. 2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1694 - 1698
- [30] Secure User Authentication in Cloud Computing [J]. PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,