共 50 条
- [2] Energy Conserving Secure VM Allocation in Untrusted Cloud Computing Environment COMPUTE'17: PROCEEDINGS OF THE 10TH ANNUAL ACM INDIA COMPUTE CONFERENCE, 2017, : 73 - 81
- [4] A new secure authentication scheme for cloud computing environment CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
- [6] Energy-Optimized Secure Remote Fingerprint Authentication in a Mobile Environment 2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
- [7] Homomorphic Authentication for Computing Securely on Untrusted Machines SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : XI - XIII
- [8] Using a Network of Untrusted Computers for Secure Computing PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS (ICAS 2011), 2011, : 57 - 61
- [9] Secure Fingerprint Authentication with Homomorphic Encryption 2020 DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2020,
- [10] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment Arabian Journal for Science and Engineering, 2021, 46 : 3865 - 3888