-
1
-
-
84888322916
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
H. T. Dinh et al., "A survey of mobile cloud computing: Architecture, applications, and approaches," Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587-1611, 2013.
-
(2013)
Wireless Commun. Mobile Comput.
, vol.13
, Issue.18
, pp. 1587-1611
-
-
Dinh, H.T.1
-
2
-
-
84862998994
-
Mobile cloud computing: A survey
-
N. Fernando, S. W. Loke, and W. Rahayu, "Mobile cloud computing: A survey," Future Gener. Comput. Sys., vol. 29, no. 1, pp. 84-106, 2013.
-
(2013)
Future Gener. Comput. Sys.
, vol.29
, Issue.1
, pp. 84-106
-
-
Fernando, N.1
Loke, S.W.2
Rahayu, W.3
-
3
-
-
71749113079
-
Identity-based authentication for cloud computing
-
H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing," in Proc. Cloud Comput., 2009, pp. 157-166.
-
(2009)
Proc. Cloud Comput.
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
4
-
-
84954436216
-
A privacy preserving three-factor authentication protocol for e-health clouds
-
Q. Jiang, M. K. Khan, X. Lu, J. Ma, and D. He, "A privacy preserving three-factor authentication protocol for e-health clouds," J. Supercomput., 2016. DOI: 10.1007/s11227-015-1610-x.
-
(2016)
J. Supercomput.
-
-
Jiang, Q.1
Khan, M.K.2
Lu, X.3
Ma, J.4
He, D.5
-
5
-
-
84964246143
-
Anonymous authentication for wireless body area networks with provable security
-
D. He, S. Zeadally, N. Kumar, and J.-H. Lee, "Anonymous authentication for wireless body area networks with provable security," IEEE Syst. J., 2016. DOI: 10.1109/JSYST.2016.2544805.
-
(2016)
IEEE Syst. J.
-
-
He, D.1
Zeadally, S.2
Kumar, N.3
Lee, J.-H.4
-
6
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Q. Jiang, J. Ma, X. Lu, and Y. Tian, "An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks," Peer-to-Peer Netw. Appl., vol. 8, no. 6, pp. 1070-1081, 2015
-
(2015)
Peer-to-Peer Netw. Appl.
, vol.8
, Issue.6
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
7
-
-
85046615306
-
-
Microsoft,Windows Live ID
-
Microsoft,Windows Live ID. (2011). [Online]. Available: https://account. live.com/.
-
(2011)
-
-
-
8
-
-
85046611617
-
-
OpenID Foundation, OpenID Authentication 2.0
-
OpenID Foundation, OpenID Authentication 2.0. (2007). [Online]. Available: http://openid.net/specs/openid-authentication-20.html
-
(2007)
-
-
-
9
-
-
85027942960
-
A privacy-aware authentication scheme for distributed mobile cloud computing services
-
Sep
-
J. L. Tsai and N. W. Lo, "A privacy-aware authentication scheme for distributed mobile cloud computing services," IEEE Syst. J., vol. 9, no. 3, pp. 805-815, Sep. 2015.
-
(2015)
IEEE Syst. J.
, vol.9
, Issue.3
, pp. 805-815
-
-
Tsai, J.L.1
Lo, N.W.2
-
10
-
-
84874324906
-
Identity-based encryption from theWeilpairing
-
D. Boneh and M. Franklin, "Identity-based encryption from theWeilpairing," in Proc. Adv. Cryptol., 2001, vol. 2139, pp. 213-229.
-
(2001)
Proc. Adv. Cryptol.
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
Feb
-
K. Lauter, "The advantages of elliptic curve cryptography for wireless security," IEEE Wireless Commun., vol. 11, no. 1, pp. 62-67, Feb. 2004.
-
(2004)
IEEE Wireless Commun.
, vol.11
, Issue.1
, pp. 62-67
-
-
Lauter, K.1
-
12
-
-
85043268105
-
Certificateless public auditing scheme for cloud-assisted wireless body area networks
-
D. He, S. Zeadally, and L. Wu. "Certificateless public auditing scheme for cloud-assisted wireless body area networks," IEEE Syst. J., 2015, DOI: 10.1109/JSYST.2015.2428620.
-
(2015)
IEEE Syst. J.
-
-
He, D.1
Zeadally, S.2
Wu, L.3
-
13
-
-
34547519982
-
Privacy preserving multifactor authentication with biometrics
-
B. S. Abhilasha, S. Anna, and M. Shimon, "Privacy preserving multifactor authentication with biometrics," J. Comput. Security, vol. 15, no. 5, pp. 529-560, 2007.
-
(2007)
J. Comput. Security
, vol.15
, Issue.5
, pp. 529-560
-
-
Abhilasha, B.S.1
Anna, S.2
Shimon, M.3
-
14
-
-
84898048082
-
Enhanced three-factor security protocol for USB consumer storage devices
-
Feb
-
D. He, N. Kumar, J.-H. Lee, and R. Sherratt, "Enhanced three-factor security protocol for USB consumer storage devices," IEEE Trans. Consum. Electron., vol. 60, no. 1, pp. 30-37, Feb. 2014.
-
(2014)
IEEE Trans. Consum. Electron.
, vol.60
, Issue.1
, pp. 30-37
-
-
He, D.1
Kumar, N.2
Lee, J.-H.3
Sherratt, R.4
-
15
-
-
85027949488
-
Robust biometrics-based authentication scheme for multiserver environment
-
Sep
-
D. He and D. Wang, "Robust biometrics-based authentication scheme for multiserver environment," IEEE Syst. J., vol. 9, no. 3, pp. 816-823, Sep. 2015.
-
(2015)
IEEE Syst. J.
, vol.9
, Issue.3
, pp. 816-823
-
-
He, D.1
Wang, D.2
-
16
-
-
84937853874
-
A secure biometrics-based multiserver authentication protocol using smart cards
-
Sep
-
V. Odelu, A. K. Das, and A. Goswami, "A secure biometrics-based multiserver authentication protocol using smart cards," IEEE Trans. Inf. Forensics Secur., vol. 10, no. 9, pp. 1953-1966, Sep. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.9
, pp. 1953-1966
-
-
Odelu, V.1
Das, A.K.2
Goswami, A.3
-
17
-
-
79959689122
-
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
-
Aug
-
X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng, "A generic framework for three-factor authentication: Preserving security and privacy in distributed systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 8, pp. 1390-1397, Aug. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.8
, pp. 1390-1397
-
-
Huang, X.1
Xiang, Y.2
Chonka, A.3
Zhou, J.4
Deng, R.H.5
-
18
-
-
84958124876
-
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
-
Q. Jiang et al., "Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy," Nonlinear Dyn., vol. 83, no. 4, pp. 2085-2101, 2016.
-
(2016)
Nonlinear Dyn.
, vol.83
, Issue.4
, pp. 2085-2101
-
-
Jiang, Q.1
-
19
-
-
84911059606
-
An efficient and improved generic framework for three-factor authentication with provably secure instantiation
-
Dec
-
J. Yu, G. Wang, Y. Mu, and W. Gao, "An efficient and improved generic framework for three-factor authentication with provably secure instantiation, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 12, pp. 2302-2313, Dec. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.12
, pp. 2302-2313
-
-
Yu, J.1
Wang, G.2
Mu, Y.3
Gao, W.4
-
20
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Adv. Cryptol., 2004, pp. 523-540.
-
(2004)
Proc. Adv. Cryptol.
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
23
-
-
84975275069
-
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
-
Jul./Aug
-
D. Wang, D. He, P. Wang, and C.-H. Chu, "Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment," IEEE Trans. Dependable Secure Comput., vol. 12, no. 4, pp. 428-442, Jul./Aug. 2015.
-
(2015)
IEEE Trans. Dependable Secure Comput.
, vol.12
, Issue.4
, pp. 428-442
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.-H.4
|