Retraction Note: An identity authentication scheme based on cloud computing environment

被引:0
|
作者
Manjun Zhang
Zheng Ma
Yan Zhang
Yongbin Wang
机构
[1] Network Technology Research Institute,
[2] China Unicom,undefined
[3] Institute of Network Technology,undefined
[4] Beijing University of Posts and Telecommunications,undefined
[5] Technology Department,undefined
[6] China Unicom,undefined
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:44525 / 44525
相关论文
共 50 条
  • [1] RETRACTION: An identity authentication scheme based on cloud computing environment (Retraction of Vol 77, Pg 4283, 2018)
    Zhang, Manjun
    Ma, Zheng
    Zhang, Yan
    Wang, Yongbin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (30) : 44525 - 44525
  • [2] RETRACTED ARTICLE: An identity authentication scheme based on cloud computing environment
    Manjun Zhang
    Zheng Ma
    Yan Zhang
    Yongbin Wang
    Multimedia Tools and Applications, 2018, 77 : 4283 - 4294
  • [3] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [4] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [5] Retraction Note to: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment
    Teena Joseph
    S. A. Kalaiselvan
    S. U. Aswathy
    R. Radhakrishnan
    A. R. Shamna
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 553 - 553
  • [6] A kind of Identity Authentication under Cloud Computing Environment
    Miao Yingkai
    Jia, Chen
    2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 12 - 15
  • [7] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [8] RETRACTED: An identity authentication scheme based on cloud computing environment (Retracted article. See SEP, 2022)
    Zhang, Manjun
    Ma, Zheng
    Zhang, Yan
    Wang, Yongbin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (04) : 4283 - 4294
  • [9] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [10] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234