共 62 条
- [1] Wang D(2015)Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment IEEE Transactions on Dependable and Secure Computing 12 428-442
- [2] He D(2016)A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing IEEE Transactions on Information Forensics and Security 11 2594-2608
- [3] Wang P(2016)A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data IEEE Transactions on Parallel and Distributed Systems 27 340-352
- [4] Chu C(2016)Enabling personalized search over encrypted outsourced data with efficiency improvement IEEE Transactions on Parallel and Distributed Systems 27 2546-2559
- [5] Xia Z(2015)Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing IEICE Transactions on Communications 98 190-200
- [6] Wang X(2015)Social network and tag sources based augmenting collaborative recommender system IEICE Transactions on Information and Systems 98 902-910
- [7] Zhang L(2007)Anonymous authentication Journal of Privacy and Confidentiality 2 35-63
- [8] Qin Z(2017)Universally composable anonymous password authenticated key exchange Science China Information Sciences 60 52107-1506
- [9] Sun X(2014)An efficient ticket based authentication protocol with unlinkability for wireless access networks Wireless Personal Communications 77 1489-26
- [10] Ren K(1996)Strong password-only authenticated key exchange SIGCOMM Computer Communication Review 26 5-1393