参考文献
[1]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
[2]张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348.
[3]BINU S,MISBAHUDDIN M,RAJ P.A Mobile Based Remote User Authentication Scheme Without Verifier Table for Cloud Based Services[C]//Proceedings of the 3rd International Symposium on Women in Computing and Informatics.New York,USA:ACM Press,2015:502-509.
[4]周长春,田晓丽,张宁,等.云计算中身份认证技术研究[J].计算机科学,2016,43(6):339-341.
[5]扈莹.云计算环境的身份认证的研究[D].北京:北京工业大学,2014.
[6]CHEN P L,YANG J H,LIN C I.ID-based User Authentication Scheme for Cloud Computing[J].Journal of Electronic Science and Technology,2013,11(2):221-224.
[7]LI X H,YANG B.Efficient Identity-based Signature Authentication Scheme in Cloud Service[J].International Journal of Advancements in Computing Technology,2013,5(5):867-876.
(下转第145页)
(上接第133页)
[8]CAO C L,ZHANG R,ZHANG M Y,et al.IBC-based Entity Authentication Protocols for Federated Cloud Systems[J].KSII Transactions on Internet & Information Systems,2013,7(5):1291-1312.
[9]MISHRA R.Anonymous Remote User Authentication and Key Agreement for Cloud Computing[C]//Proceedings of the 3rd International Conference on Soft Computing for Problem Solving.Berlin,Germany:Springer-Verlag,2014:899-913.
[10]DONG Z M,ZHANG L,LI J T.Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing[C]//Proceedings of the 17th International Conference on Computational Science and Engineering.[S 1.]:IEEE Computer Society Press,2014:1746-1751.
[11]王中华,韩臻,刘吉强,等.云环境下基于PTPM 和无证书公钥的身份认证方案[J].软件学报,2016,27(6):1523-1537.
[12]CANERRI R,KRAWCZYK H.Analysis of Key-exchange Protocols and Their User for Building Secure Channels[C]//Proceedings the lnternational Conference
on the Theorry and Applications of Cryptographic Technoques.Berlin,Germany:Springer-Verlag,2001:453-474.
[13]杨力,马建峰,姜奇.无线移动网络跨可信域的直接匿名证明方案[J].软件学报,2012,23(5):1260-1271.
[14]周彦伟,杨波,吴振强,等.基于身份的跨域直接匿名认证机制[J].中国科学:信息科学,2014,44(9):1102-1120.
[15]周彦伟,杨波,张文政.安全高效的异构无线网络可控匿名漫游认证协议[J].软件学报,2016,27(2):451-465.
[16]LI H W,DAI Y S,TIAN L,et al.Identity-based Authentication for Cloud Computing[C]//Proceedings of the 1st International Conference on Cloud Computing.Berlin,Germany:Springer-Verlag,2009:157-166.
[17]TIN Y S T,BOYD C,NIETO J G.Provably Secure Key Exchange:An Engineering Approach[C]//Proceedings of Australasian Information Security Workshop.Adelaide,Australian:Australian Computer Society,2003:97-104.
编辑索书志 |