[1] |
VENKATESH A, EASTAFF M S. A Study of Data Storage Security Issues in Cloud Computing[J]. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2018, 3(1): 1741-1745.
|
[2] |
YANG Pan, XIONG Naixue, REN Jingli. Data Security and Privacy Protection for Cloud Storage: A Survey[J]. IEEE Access, 2020(8): 131723-131740.
|
[3] |
SONG D X, WAGNER D, PERRIG A. Practical Techniques for Searches on Encrypted Data[C]// IEEE. Proceeding 2000 IEEE Symposium on Security and Privacy. New York: IEEE, 2000: 44-55.
|
[4] |
BONEH D, DI C G, OSTROVSKY R, et al. Public Key Encryption with Keyword Search[C]// Springer. International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg: Springer, 2004: 506-522.
|
[5] |
HUANG Yicai, LI Sensen, YU Bin. Survey of Symmetric Searchable Encryption in Cloud Environment[J]. Journal of Electronics & Information Technology, 2022, 45(3): 1134-1146.
|
|
黄一才, 李森森, 郁滨. 云环境下对称可搜索加密研究综述[J]. 电子与信息学报, 2022, 45(3):1134-1146.
|
[6] |
KUNAL S, SAHA A, AMIN R. An Overview of Cloud-Fog Computing: Architectures, Applications with Security Challenges[EB/OL]. (2019-05-16)[2023-02-02]. https://onlinelibrary.wiley.com/doi/abs/10.1002/spy2.72.
|
[7] |
OMETOV A, BEZZATEEV S, MÄKITALO N, et al. Multi-Factor Authentication: A Survey[EB/OL]. (2018-01-05)[2023-02-02]. https://www.mdpi.com/2410-387X/2/1/1.
|
[8] |
LI Weifeng. Talking About the Advantages and Disadvantages of Common Biometric Identification Technology[J]. Network Security Technology & Application, 2021(8): 144-146.
|
|
李维峰. 浅谈常用生物特征识别技术的优缺点[J]. 网络安全技术与应用, 2021(8):144-146.
|
[9] |
LI Jun, CHAI Haixin. Research on Privacy in Biometrics[J]. Journal of Information Security Research, 2020, 6(7): 589-601.
|
|
李俊, 柴海新. 生物特征识别隐私保护研究[J]. 信息安全研究, 2020, 6(7):589-601.
|
[10] |
DODIS Y, REYZIN L, SMITH A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data[C]// Springer. International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg: Springer, 2004: 523-540.
|
[11] |
BOYEN X. Reusable Cryptographic Fuzzy Extractors[C]// ACM. Proceedings of the 11th ACM Conference on Computer and Communications Security. New York: ACM, 2004: 82-91.
|
[12] |
SIMHADRI S, STEEL J, FULLER B. Cryptographic Authentication from the Iris[C]// Springer. Information Security:22nd International Conference. Heidelberg: Springer, 2019: 465-485.
|
[13] |
HUANG K, MANULIS M, CHEN L. Password Authenticated Keyword Search[C]// IEEE. 2017 IEEE Symposium on Privacy-Aware Computing. New York: IEEE, 2017: 129-140.
|
[14] |
SALAHDINE F, KAABOUCH N. Social Engineering Attacks: A Survey[EB/OL]. (2019-04-02)[2023-02-02]. https://www.mdpi.com/1999-5903/11/4/89.
|
[15] |
WU Defu. How to Prevent "Library Collision" to Protect Your Privacy[J]. Computer & Network, 2018, 44(1): 43-53.
|
|
吴德福. 如何防止“撞库”保护自己的隐私安全[J]. 计算机与网络, 2018, 44(1): 43-53.
|
[16] |
GARDHAM D, MANULIS M, DRĂGAN C C. Biometric-Authenticated Searchable Encryption[C]// Springer. International Conference on Applied Cryptography and Network Security. Heidelberg: Springer, 2020: 40-61.
|
[17] |
PEDERSEN T P. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing[C]// Springer. Annual International Cryptology Conference. Heidelberg: Springer, 1992: 129-140.
|
[18] |
AKHTAR Z, MICHELONI C, FORESTI G L. Biometric Liveness Detection: Challenges and Research Opportunities[J]. IEEE Security & Privacy, 2015, 13(5): 63-72.
|
[19] |
FLEISCHHACKER N, MANULIS M, AZODI A. A Modular Framework for Multi-Factor Authentication and Key Exchange[C]// Springer. International Conference on Research in Security Standardisation. Heidelberg: Springer, 2014: 190-214.
|
[20] |
POINTCHEVAL D, ZIMMER S. Multi-Factor Authenticated Key Exchange[C]// Springer. International Conference on Applied Cryptography and Network Security. Heidelberg: Springer, 2008: 277-295.
|
[21] |
WANG Zhengcai, YANG Shiping. Research on Principles and Methods of Designing Authentication Protocols against Replay Attack[J]. Computer Engineering and Design, 2008, 29(20): 5163-5165.
|
|
王正才, 杨世平. 抗重放攻击认证协议的设计原则和方法研究[J]. 计算机工程与设计, 2008, 29(20):5163-5165.
|
[22] |
BELLARE M, BOLDYREVA A, MICALI S. Public-Key Encryption in a Multi-User Setting: Security Proofs and Improvements[C]// Springer. International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg: Springer, 2000: 259-274.
|