-
1
-
-
77950347409
-
A view of cloud computing
-
Apr.
-
M. Armbrust, A. Fox, R.Griffith, A. D. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia,"A view of cloud computing", Communications of the ACM ,Vol.53, No.4, Apr. 2010, pp.50-58.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
84880192224
-
Security and Privacy in Cloud Computing: A Survey
-
M. Zhou, Z. Rong, W. Xie, W. Qian, and A. Zhou ,"Security and Privacy in Cloud Computing: A Survey", Proc. of the Sixth International Conference Semantics Knowledge and Grid ( SKG'10), Beijing , China, Nov. 2010, pp.105-112,.
-
Proc. of the Sixth International Conference Semantics Knowledge and Grid ( SKG'10), Beijing, China, Nov. 2010
, pp. 105-112
-
-
Zhou, M.1
Rong, Z.2
Xie, W.3
Qian, W.4
Zhou, A.5
-
3
-
-
84867405868
-
Solve Five Key IT Security Challenges with Cloud-Based Authentication
-
White paper , USA, Feb.
-
http:// www.symantec.com,"Solve Five Key IT Security Challenges With Cloud-Based Authentication", White paper , Confidence In a connected world Symantec, USA, Feb., 2011.
-
(2011)
Confidence in A Connected World Symantec
-
-
-
4
-
-
79952412839
-
Research on Resource Management for Cloud Computing Based Information System
-
X. Han, X. Li, and Y. Liu,"Research on Resource Management for Cloud Computing Based Information System", Proc. of the International Conference on Computational and Information Sciences (ICCIS'10), Chengdu, China, Dec. 2010, pp.491-494.
-
Proc. of the International Conference on Computational and Information Sciences (ICCIS'10), Chengdu, China, Dec. 2010
, pp. 491-494
-
-
Han, X.1
Li, X.2
Liu, Y.3
-
5
-
-
77950803004
-
A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
-
S. Shin, K. Kobara, and H. Imai,"A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange", IEICE Transactions on Fundamentals, Vol.E91-A, No11, 2008, pp.3312-3323.
-
(2008)
IEICE Transactions on Fundamentals
, vol.E91-A
, Issue.11
, pp. 3312-3323
-
-
Shin, S.1
Kobara, K.2
Imai, H.3
-
6
-
-
33646844820
-
Anonymous Password-Based Authenticated Key Exchange
-
D. Q. Viet, A. Yamamura, and T. Hidema,"Anonymous Password-Based Authenticated Key Exchange", Proc. of 6th International Conference on Cryptology in India (Indocryp'05), Bangalore, India, Dec. 2005, pp.233-257.
-
Proc. of 6th International Conference on Cryptology in India (Indocryp'05), Bangalore, India, Dec. 2005
, pp. 233-257
-
-
Viet, D.Q.1
Yamamura, A.2
Hidema, T.3
-
7
-
-
84976832950
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof system
-
July
-
O. Goldreich, S. Micali, and A. Wigderson,"Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof system", J. of the ACM, Vol.38, No.3, July 1991, pp.690-728.
-
(1991)
J. of the ACM
, vol.38
, Issue.3
, pp. 690-728
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
8
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali, and C. Rackoff,"The knowledge complexity of interactive proof-systems", Proc. of the Seventeenth Annual ACM Symposium on Theory of Computing (STOC'85), New York, USA, May 1985, pp.291-304.
-
Proc. of the Seventeenth Annual ACM Symposium on Theory of Computing (STOC'85), New York, USA, May 1985
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
9
-
-
84948990367
-
How to Explain Zero-Knowledge Protocols to Your Children
-
J. Quisquater, L. C. Guillou, and T. A. Berson,"How to Explain Zero-Knowledge Protocols to Your Children", Proc. of Advances in Cryptology (CRYPTO'89), Santa Barbara, CA, USA, Aug. 1989, pp.628-631.
-
Proc. of Advances in Cryptology (CRYPTO'89), Santa Barbara, CA, USA, Aug. 1989
, pp. 628-631
-
-
Quisquater, J.1
Guillou, L.C.2
Berson, T.A.3
-
10
-
-
0024611659
-
The knowledge Complexity of interactive proof systems
-
Feb.
-
S. Goldwasser, S. Micali and C. Rackoff,"The knowledge Complexity of interactive proof systems", SIAM J. on Computing, Vol.18, No.1, Feb. 1989, pp.186-208.
-
(1989)
SIAM J. on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
11
-
-
84867423145
-
Zero-Knowledge group identification and hidden group signature for smart cards using paring
-
Dec.
-
Y. W. Lee, and B. M. Choi,"Zero-Knowledge group identification and hidden group signature for smart cards using paring", J. of the Chungcheong Mathematical Society, Vol.20, Dec. 2007, pp.4-12.
-
(2007)
J. of the Chungcheong Mathematical Society
, vol.20
, pp. 4-12
-
-
Lee, Y.W.1
Choi, B.M.2
-
12
-
-
70449461453
-
Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
-
A.C.-F. Chan,"Symmetric-Key Homomorphic Encryption for Encrypted Data Processing", Proc. of the IEEE International Conference on Communications (ICC'09), Dresden, Germany, June 2009, pp.774-778.
-
Proc. of the IEEE International Conference on Communications (ICC'09), Dresden, Germany, June 2009
, pp. 774-778
-
-
Chan, A.C.-F.1
-
13
-
-
0004192381
-
-
CRC Press, Boca Raton, Floreda, USA, Oct.
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot,"Handbook of Applied Cryptography", CRC Press, Boca Raton, Floreda, USA, Oct. 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
14
-
-
43949118608
-
A Survey of Homomorphic Encryption for Nonspecialists
-
Jan.
-
C. Fontaine and F. Galand,"A Survey of Homomorphic Encryption for Nonspecialists", EURASIP Journal on Information Security, Vol.2007, Jan. 2007, pp.1-10.
-
(2007)
EURASIP Journal on Information Security
, vol.2007
, pp. 1-10
-
-
Fontaine, C.1
Galand, F.2
-
15
-
-
77951595293
-
Extending Web Applications with a Lightweight Zero Knowledge Proof Authentication
-
S. Grzonkowski, M. Zaremba, W. Zaremba and B. McDaniel,"Extending Web Applications with a Lightweight Zero Knowledge Proof Authentication", Proc. of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology (CSTST'08), Cergy-Pontoise, France, Oct. 2008, pp.65-70.
-
Proc. of the 5th International Conference on Soft Computing As Transdisciplinary Science and Technology (CSTST'08), Cergy-Pontoise, France, Oct. 2008
, pp. 65-70
-
-
Grzonkowski, S.1
Zaremba, M.2
Zaremba, W.3
McDaniel, B.4
-
16
-
-
51649110861
-
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
-
Oct.
-
L. Lu, J. Han, Y. Liu, L. Hu, J. Huai, L. M. N,i and J. Ma ,"Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps", IEEE Transactions on Parallel and Distributed System, Vol.19, Oct. 2008, pp.1325-1337.
-
(2008)
IEEE Transactions on Parallel and Distributed System
, vol.19
, pp. 1325-1337
-
-
Lu, L.1
Han, J.2
Liu, Y.3
Hu, L.4
Huai, J.5
Ni, L.M.6
Ma, J.7
-
17
-
-
33644513706
-
ZKP-based Identification Scheme for Base Nodes in Wireless Sensor Networks
-
D. Anshul and S.Roy ,"ZKP-based Identification Scheme for Base Nodes in Wireless Sensor Networks", Proc. of the ACM Symposium on Applied Computing (SAC'05), Santa Fe, New Mexico, USA, Mar. 2005, pp.319-323.
-
Proc. of the ACM Symposium on Applied Computing (SAC'05), Santa Fe, New Mexico, USA, Mar. 2005
, pp. 319-323
-
-
Anshul, D.1
Roy, S.2
-
20
-
-
0026850091
-
Encrypted Key Exchange: Password- Based Protocols Secure Against Dictionary Attacks
-
S. Bellovin and M. Merritt," Encrypted Key Exchange: Password- Based Protocols Secure Against Dictionary Attacks", Proc. of the IEEE Symposium on Research in Security and Privacy (SRSP'92)), May 1992, Oakland, CA , USA, pp.72-84.
-
Proc. of the IEEE Symposium on Research in Security and Privacy (SRSP'92), May 1992, Oakland, CA, USA
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
21
-
-
0027741529
-
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise
-
S. Bellovin and M. Merritt,"Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise", Proc. of the 1st Conference Computer and Communication Security (CCS'93), Fairfax, Virginia, USA, Nov. 1993, pp.244-250.
-
Proc. of the 1st Conference Computer and Communication Security (CCS'93), Fairfax, Virginia, USA, Nov. 1993
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
22
-
-
84864770378
-
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
-
Apr.
-
S. Jeon , H. S. Kim, and M. S. Kim,"Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards", J. of Security Engineering, Vol.8, No.2, Apr. 2011, pp.237-254.
-
(2011)
J. of Security Engineering
, vol.8
, Issue.2
, pp. 237-254
-
-
Jeon, S.1
Kim, H.S.2
Kim, M.S.3
-
23
-
-
0036302680
-
An Efficient and Practical Solution to Remote Authentication
-
Aug.
-
H. Y. Chien, J. Jan, and Y. Tseng,"An Efficient and Practical Solution to Remote Authentication", J. of Computers and Security, Vol.21, No.4, Aug. 2002, pp.372-375.
-
(2002)
J. of Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.2
Tseng, Y.3
-
24
-
-
0026154828
-
SPX: Global Authenticaiton Using Public Key Certificate
-
J. Tardo and K. Alagappan,"SPX: Global Authenticaiton Using Public Key Certificate", Proc. of the IEEE Sysmposium on Research in Security and Privacy (SRSP'92), Oakland, CA , USA, May 1991, pp.232-244.
-
Proc. of the IEEE Sysmposium on Research in Security and Privacy (SRSP'92), Oakland, CA, USA, May 1991
, pp. 232-244
-
-
Tardo, J.1
Alagappan, K.2
-
25
-
-
36049049404
-
An Introduction to Biometric Authentication Systems
-
Springer, London
-
J. Wayman, A. Jain, D. Maltoni, and D. Maio,"An Introduction to Biometric Authentication Systems ", Biometric systems Technology, Design and Performance Evaluation, Springer, London, 2005, pp.1-20.
-
(2005)
Biometric Systems Technology, Design and Performance Evaluation
, pp. 1-20
-
-
Wayman, J.1
Jain, A.2
Maltoni, D.3
Maio, D.4
-
26
-
-
84875360292
-
Everything you need to know about biometric identification
-
Warfel & Miller Inc, Washington DC, Jan.
-
B. Millerr,"Everything you need to know about biometric identification", Personal Identification News 1988 Biometric Industry Directory, Warfel & Miller Inc, Washington DC, Jan. 1988.
-
(1988)
Personal Identification News 1988 Biometric Industry Directory
-
-
Millerr, B.1
|