共 148 条
[1]
Xia Z(2015)A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data IEEE Trans. Parallel Distrib. Syst. E98–B 190-200
[2]
Wang X(2015)Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing IEICE Trans. Commun. 16 317-323
[3]
Sun X(2015)Mutual verifiable provable data auditing in public cloud storage J. Internet Technol. 15 929-936
[4]
Wang Q(2014)A variable threshold-value authentication architecture for wireless mesh networks J. Internet Technol. 78 247-269
[5]
Fu Z(2014)A secure and effective anonymous authentication scheme for roaming service in global mobility networks Wirel. Pers. Commun. 12 428-442
[6]
Sun X(2015)Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment IEEE Trans. Depend. Secure Comput. 321 162-178
[7]
Liu Q(2015)Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity Inf. Sci. 91 2021-2040
[8]
Zhou L(2003)Comparing passwords, tokens, and biometrics for user authentication Proc. IEEE 9 2302-2313
[9]
Shu J(2014)An efficient and improved generic framework for three-factor authentication with provably secure instantiation IEEE Trans. Inf. Forensics Secur. 22 1390-1397
[10]
Ren Y(2011)A generic framework for three-factor authentication: preserving security and privacy in distributed systems IEEE Trans. Parallel Distrib. Syst. 27 19-23