共 50 条
- [21] Secure User Authentication in Cloud Computing PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
- [23] A simple authentication encryption scheme CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):
- [24] A Simple Authentication Scheme for Clouds 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 565 - 569
- [26] Robust remote user authentication scheme INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 935 - 942
- [28] A lightweight authentication scheme with user untraceability Frontiers of Information Technology & Electronic Engineering, 2015, 16 : 259 - 271
- [29] Cryptanalysis of the User Authentication Scheme with Anonymity FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 285 - +
- [30] A Hybrid Graphical User Authentication Scheme 2015 COMMUNICATION, CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2015, : 411 - 415