Retraction Note: An identity authentication scheme based on cloud computing environment

被引:0
|
作者
Manjun Zhang
Zheng Ma
Yan Zhang
Yongbin Wang
机构
[1] Network Technology Research Institute,
[2] China Unicom,undefined
[3] Institute of Network Technology,undefined
[4] Beijing University of Posts and Telecommunications,undefined
[5] Technology Department,undefined
[6] China Unicom,undefined
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:44525 / 44525
相关论文
共 50 条
  • [21] Authentication Scheme in Cloud Computing: A Review
    Meena, Sunita
    Syal, Rupali
    PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [22] A Privacy Authentication Scheme Based on Cloud for Medical Environment
    Chen, Chin-Ling
    Yang, Tsai-Tung
    Chiang, Mao-Lun
    Shih, Tzay-Farn
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (11)
  • [23] A Privacy Authentication Scheme Based on Cloud for Medical Environment
    Chin-Ling Chen
    Tsai-Tung Yang
    Mao-Lun Chiang
    Tzay-Farn Shih
    Journal of Medical Systems, 2014, 38
  • [24] Heterogeneous Cross-Domain Identity Authentication Scheme Based on Proxy Resignature in Cloud Environment
    Lv, Yongyang
    Liu, Wenju
    Wang, Ze
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [25] An ID-Based User Authentication Scheme for Cloud Computing
    Yang, Jen-Ho
    Lin, Pei-Yu
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
  • [26] ID-Based User Authentication Scheme for Cloud Computing
    Ping-Liang Chen
    Jen-Ho Yang
    Ching-I Lin
    Journal of Electronic Science and Technology, 2013, (02) : 221 - 224
  • [27] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [28] Dyanimc Key based Authentication Scheme for Vehicular Cloud Computing
    Sharma, Manish Kumar
    Bali, Rasmeet S.
    Kaur, Arvinder
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1059 - 1064
  • [29] ID-Based User Authentication Scheme for Cloud Computing
    PingLiang Chen
    JenHo Yang
    ChingI Lin
    JournalofElectronicScienceandTechnology, 2013, 11 (02) : 221 - 224
  • [30] Distributed Authentication in the Cloud Computing Environment
    Liu, Yanzhu
    Li, Zhi
    Sun, Yuxia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 810 - 818