Author:
Jannati Hoda,Bahrak Behnam
Subject
Information Systems and Management,Computer Science Applications,Safety, Risk, Reliability and Quality,Modeling and Simulation
Reference42 articles.
1. H. Ahn, H. Chang, C. Jang and E. Choi, User authentication platform using provisioning in cloud computing environment, in Advanced Communication and Networking T. Kim, H. Adeli, R. Robles and M. Balitanas (Eds.), Springer-Verlag, Berlin/Heidelberg, Germany, pp. 132–138, 2011.
2. E. Barker, W. Barker, W. Burr, W. Polk and M. Smid, Recommendation for Key Management – Part 1: General (Revised), NIST Special Publication 800-57, National Institute of Standards and Technology, Gaithersburg, Maryland, 2007.
3. D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, in Advances in Cryptology J. Kilian (Ed.), Springer-Verlag, Berlin/Heidelberg, Germany, pp. 213–229, 2001.
4. J. Cha and J. Cheon, An identity-based signature from gap Diffie-Hellman groups, in Public Key Cryptography Y. Desmedt (Ed.), Springer-Verlag, Berlin/Heidelberg, Germany, pp. 18–30, 2003.
5. T. Chen, H. Yeh and W. Shih, An advanced ECC dynamic ID-based remote mutual authentication scheme for cloud computing, Proceedings of the Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering pp. 155–159, 2011.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献