메뉴 건너뛰기




Volumn , Issue , 2013, Pages 105-110

Multi-factor authentication framework for cloud computing

Author keywords

Arithmetic Captcha; CAM System; Multi Factor Authentication; Out of Band Authentication

Indexed keywords

ARTIFICIAL INTELLIGENCE; CAMS; CLOUD COMPUTING; COMPUTER SYSTEMS; ELECTRONIC MAIL FILTERS; SECURITY OF DATA;

EID: 84892773341     PISSN: 21668523     EISSN: 21668531     Source Type: Conference Proceeding    
DOI: 10.1109/CIMSim.2013.25     Document Type: Conference Paper
Times cited : (42)

References (30)
  • 1
    • 78649290366 scopus 로고    scopus 로고
    • The nist definition of cloud computing versiong 15 technical report
    • Mell, P; Grance, T. The NIST Definition of cloud computing Versiong 15 Technical Report. Computer and Information Sci-ences. 53(6), pp. 1-10. 2009.
    • (2009) Computer and Information Sci-ences. , vol.53 , Issue.6 , pp. 1-10
    • Mell, P.1    Grance, T.2
  • 5
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • Buyya, R., Yeo, C., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25, 599-616.
    • (2009) Future Generation Computer Systems , vol.25 , pp. 599-616
    • Buyya, R.1    Yeo, C.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 6
    • 76649142802 scopus 로고    scopus 로고
    • Its written in the cloud: The hype and promise of cloud computing
    • Sharif, A. M. (2010), Its written in the cloud: The hype and promise of cloud computing, Journal of Enterprise Information Management, Vol. 23 No. 2, pp. 131-4.
    • (2010) Journal of Enterprise Information Management , vol.23 , Issue.2 , pp. 131-134
    • Sharif, A.M.1
  • 9
    • 69349098776 scopus 로고    scopus 로고
    • Cloud computing and the common man
    • Viega J (2009) Cloud computing and the common man, Com-puter 42(8):106-08.
    • (2009) Com-puter , vol.42 , Issue.8 , pp. 106-108
    • Viega, J.1
  • 13
    • 1242265154 scopus 로고    scopus 로고
    • Whitman in defense of the realm: Understanding the threats to information security
    • Michael E. Whitman In defense of the realm: Understanding the threats to information security International Journal of Information Management 24 (2004) 43-57.
    • (2004) International Journal of Information Management , vol.24 , pp. 43-57
    • Michael, E.1
  • 18
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password Authentication with Insecure Communication, " Communications of the ACM, vol. 24, pp. 770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 19
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • C. Lin, Hwang, T., "A password authentication scheme with secure password updating, " Computers & Security, vol. 22, pp. 68-72, 2003.
    • (2003) Computers & Security , vol.22 , pp. 68-72
    • Lin, C.1    Hwang, T.2
  • 20
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • M. Peyravian, Zunic, N., "Methods for Protecting Password Transmission, " Computers & Security, vol. 19, pp. 466-469, 2000.
    • (2000) Computers & Security , vol.19 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 22
    • 12444270608 scopus 로고    scopus 로고
    • Strong user authentication
    • Daniel Mouly (2002): Strong User Authentication, Informa-Tion Systems Security, 11:2, 47-53.
    • (2002) Informa-Tion Systems Security , vol.11 , Issue.2 , pp. 47-53
    • Mouly, D.1
  • 23
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authen-Tication scheme using smart cards
    • M. S. Hwang, and L. H. Li, "A New Remote User Authen-Tication Scheme using Smart Cards", IEEE Transactions on Consumer Electronics 46 (1) (2000) 28-30.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 25
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, A password authentication scheme over insecure networks, J. Comput. System Sci. 72 (4) (2006) 727-740.
    • (2006) J. Comput. System Sci. , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.-E.1    Lee, C.-C.2    Hwang, M.-S.3
  • 26
    • 4043072876 scopus 로고    scopus 로고
    • Efficient remote user au-Thentication scheme based on generalized ElGamal signature scheme
    • E. J. Yoon, E. K. Ryu, K. Y. Yoo, Efficient remote user au-Thentication scheme based on generalized ElGamal signature scheme, IEEE Trans. Consum. Electron. 50 (2) 2004.
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , pp. 2
    • Yoon, E.J.1    Ryu, E.K.2    Yoo, K.Y.3
  • 27
    • 33744828520 scopus 로고    scopus 로고
    • New authentication scheme based on a one-way hash function and Diffie Hellman key exchange
    • LNCS, Springer- Verlag
    • E. J. Yoon, K. Y. Yoo, New authentication scheme based on a one-way hash function and DiffieHellman key exchange, 4th International Conference of Cryptology and Network Security, CANS 2005, LNCS vol. 3810, Springer-Verlag, pp. 147-160.
    • (2005) 4th International Conference of Cryptology and Network Security, CANS , vol.3810 , pp. 147-160
    • Yoon, E.J.1    Yoo, K.Y.2
  • 29
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, A password authentication scheme over insecure networks, J. Comput. System Sci. 72 (4) (2006) 727-740.
    • (2006) J. Comput. System Sci. , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.-E.1    Lee, C.-C.2    Hwang, M.-S.3
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.