共 26 条
[1]
Fan P., Zhou W., Advances in anti-doppler effect techniques for high mobility wireless communications, Journal of Southwest Jiaotong University, 51, 3, pp. 405-417, (2016)
[2]
Li R., Dong X., Gu X., Et al., Overview of the data security and privacy-preserving of mobile cloud services, Journal on Communications, 34, 12, pp. 158-165, (2013)
[3]
Dely P., Kassler A., Chow L., Et al., A software-defined networking approach for handover management with real-time video in WLANs, Journal of Modern Transportation, 21, pp. 58-65, (2013)
[4]
Tsai J.L., Lo N.W., A privacy-aware authentication scheme fordistributed mobile cloud computing services, IEEE Systems Journal, 9, 3, pp. 805-815, (2015)
[5]
Jiang Q., Ma J.F., Wei F.S., On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services, IEEE Systems Journal, 99, pp. 4-7, (2016)
[6]
Liu H., Li H., Ma Z., Efficient and secure authentication scheme for vehicular ad hoc networks, Journal of Southwest Jiaotong University, 46, 2, pp. 315-320, (2011)
[7]
Lee S., Ong I., Lim H.T., Et al., Two factor authentication for cloud computing, International Journal of KIMICS, 8, 4, pp. 427-432, (2010)
[8]
Choudhury A.J., Kumar P., Sain M., Et al., A Strong user authentication framework for cloud computing, IEEE Asia -Pacific Services Computing Conference, pp. 110-115, (2011)
[9]
Chen N., Jiang R., Security analysis and improvement of user authentication framework for cloud computing, Journal of Networks, 9, 1, pp. 198-203, (2014)
[10]
Wang R., Chen S., Wang X.F., Signing me onto your accounts through facebook and google: a traffic-guided security study of commercially deployed single-sign-on Web services, Security and Privacy, pp. 365-379, (2012)