Retraction Note: An identity authentication scheme based on cloud computing environment

被引:0
|
作者
Manjun Zhang
Zheng Ma
Yan Zhang
Yongbin Wang
机构
[1] Network Technology Research Institute,
[2] China Unicom,undefined
[3] Institute of Network Technology,undefined
[4] Beijing University of Posts and Telecommunications,undefined
[5] Technology Department,undefined
[6] China Unicom,undefined
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:44525 / 44525
相关论文
共 50 条
  • [1] RETRACTION: An identity authentication scheme based on cloud computing environment (Retraction of Vol 77, Pg 4283, 2018)
    Zhang, Manjun
    Ma, Zheng
    Zhang, Yan
    Wang, Yongbin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (30) : 44525 - 44525
  • [2] RETRACTED ARTICLE: An identity authentication scheme based on cloud computing environment
    Manjun Zhang
    Zheng Ma
    Yan Zhang
    Yongbin Wang
    [J]. Multimedia Tools and Applications, 2018, 77 : 4283 - 4294
  • [3] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [4] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    [J]. 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [5] Retraction Note to: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment
    Teena Joseph
    S. A. Kalaiselvan
    S. U. Aswathy
    R. Radhakrishnan
    A. R. Shamna
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 553 - 553
  • [6] A kind of Identity Authentication under Cloud Computing Environment
    Miao Yingkai
    Jia, Chen
    [J]. 2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 12 - 15
  • [7] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [8] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [9] RETRACTED: An identity authentication scheme based on cloud computing environment (Retracted article. See SEP, 2022)
    Zhang, Manjun
    Ma, Zheng
    Zhang, Yan
    Wang, Yongbin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (04) : 4283 - 4294
  • [10] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234