共 85 条
[1]
Akherfi K(2018)Mobile cloud computing for computation offloading: issues and challenges Appl. Comput. Inform. 14 1-16
[2]
Gerndt M(1989)A logic of authentication Proc. R. Soc. Lond. A 27 3430-3440
[3]
Harroud H(2014)Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update Int. J. Commun. Syst. 8 28956-28969
[4]
Burrows M(2020)Two-factor mutual authentication offloading for mobile cloud computing IEEE Access 73 317-348
[5]
Abadi M(2020)Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues Telecommun. Syst. 31 1118-1123
[6]
Chang YF(2009)Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Comput. Stand. Interfaces 46 28-30
[7]
Tai WL(2000)A new remote user authentication scheme using smart cards IEEE Trans. Consum. Electron. 50 251-255
[8]
Chang HC(2004)Efficient multi-server password authenticated key agreement using smart cards IEEE Trans. Consum. Electron. 55 2551-2556
[9]
Derhab A(2008)Robust and efficient password-authenticated key agreement using smart cards IEEE Trans. Ind. Electron. 24 770-772
[10]
Belaoued M(1981)Password authentication with insecure communication Commun. ACM 38 13863-13870