[1] |
解福. 云计算环境中认证与密钥协商关键技术研究[D]. 济南:山东师范大学, 2014.
|
[2] |
唐春明,郑晓龙. 云计算中一种对大群组用户的隐私保护公共审计方案[J]. 信息网络安全,2015(2):19-25.
|
[3] |
RAHAMAN S M, FARHATULLAH M. A Framework for Preserving Privacy in Cloud Computing with User Service Dependent Identity[EB/OL]. .
|
[4] |
SARVABHATLA M, REDDY C M, VORUGUNTI C S. A Robust Pairing-free ID-based Mutual Authentication Framework for Cloud Computing[EB/OL]. .
|
[5] |
马威,韩臻,成阳. 可信云计算中的多级管理机制研究[J]. 信息网络安全,2015(7):20-25.
|
[6] |
CURRAN K, FERRY E, RAW J O.Security Evaluation of the OAuth 2.0 Framework[J]. Information & Computer Security, 2015, 23(1):73-101.
|
[7] |
DING X, WEI J. A Scheme for Confidentiality Protection of OpenID Authentication Mechanism[EB/OL]. .
|
[8] |
CASTIGLIONE A, PALMIERI F, CHEN C L, et al.A Blind Signature-based Approach for Cross-domain Authentication in the Cloud Environment[J]. International Journal of Data Warehousing & Mining, 2016, 12(1):34-48.
|
[9] |
WU Z, GAO S, CLING E S, et al. A Study an Replay Attack and Anti-spoofing for Text-dependent Speaker Verification[EB/OL]. .
|
[10] |
王志刚,马春光,史晓倩. 基于Binary LWE的全同态加密方案研究[J]. 信息网络安全,2015(7):41-50.
|
[11] |
DELFT BV, OOSTDIJK M. A Security Analysis of OpenID[EB/OL]. .
|
[12] |
秦志光,包文意,赵洋,等. 云存储中一种模糊关键字搜索加密方案[J]. 信息网络安全,2015(6):7-12.
|
[13] |
HE D, CHEN Y, CHEN J.An Id-based Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments[J]. Arabian Journal for Science & Engineering, 2013, 38(8):2055-2061.
|
[14] |
HÖLBL M, WELZER T, BRUMEN B. Two Proposed Identity-based Three-party Authenticated Key Agreement Protocols from Pairings[J]. Computers & Security, 2010, 29(2):244-252.
|
[15] |
ISLAM S H, BISWAS G P. Certificateless Strong Designated Verifier MultisignatureScheme Using Bilinear Pairings[EB/OL]. .
|
[16] |
LEE C C, LAI Y M, CHEN C L, et al.A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing[J]. Information Technology & Control, 2013, 42(3):247-252.
|
[17] |
ZHANG Y, ZHANG Y, LI Y, et al.Strong Designated Verifier Signature Scheme Resisting Replay Attack[J]. Information Technology & Control, 2015, 44(2): 58-63.
|
[18] |
ZHANG W, WANG X, KHAN M K.A Virtual Bridge Certificate Authority-based Cross-domain Authentication Mechanism for Distributed Collaborative Manufacturing Systems[J]. Security & Communication Networks, 2015, 8(6):937-951.
|
[19] |
YAO Y, WANG X, SUN X. A Cross Heterogeneous Domain Authentication Model Based on PKI[EB/OL]. .
|
[20] |
高丽丽, 王琼. 基于身份认证的三方密钥协商协议设计[J]. 软件导刊, 2015(2):159-160.
|
[21] |
HE D, CHEN Y, CHEN J.An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments[J]. Arabian Journal for Science & Engineering, 2013, 38(8):2055-2061.
|