共 50 条
- [1] A Trusted Third Party-based Authentication Scheme in Cloud Computing INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 850 - 856
- [2] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing The Journal of Supercomputing, 2023, 79 : 11261 - 11299
- [3] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing JOURNAL OF SUPERCOMPUTING, 2023, 79 (10): : 11261 - 11299
- [4] Protection of Identity Information in Cloud Computing without Trusted Third Party 2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010, 2010, : 368 - 372
- [5] A novel trusted third party based signcryption scheme Multimedia Tools and Applications, 2020, 79 : 22749 - 22769
- [7] Authenticated public key distribution scheme without trusted third party EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 926 - 935
- [10] Multiparty authentication services and key agreement protocols with semi-trusted third party Journal of Computer Science and Technology, 2002, 17 : 749 - 756