›› 2013, Vol. 13 ›› Issue (10): 0-0.
• 信息网络安全 •
朱荣华;高能;向继
ZHU Rong-hua%GAO Neng%XIANG Ji
摘要: In this paper, we introduce two typical authentication mechanisms in cloud computing, which include Windows Account and Google Account, and analyze the model of authentication and the two-factor authentication in these mechanisms. At last, we present and