共 50 条
- [22] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200
- [23] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card JOURNAL OF SUPERCOMPUTING, 2022, 78 (01): : 497 - 522
- [24] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card The Journal of Supercomputing, 2022, 78 : 497 - 522
- [26] Scalable threshold scheme without a trusted third party PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 853 - 858
- [27] Reputation-based Trust Management in Cloud using a Trusted Third Party 2017 THIRD INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING & MANAGEMENT (ICONSTEM), 2017, : 216 - 221
- [28] Secured Document Management through A Third Party Auditor Scheme in Cloud Computing 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATION AND COMPUTATIONAL ENGINEERING (ICECCE), 2014, : 109 - 118
- [29] A Trusted Third Party Based Secure Authentication Scheme of E-Commerce EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 590 - 594