Citation: | XIONG Ling, PENG Daiyuan, PENG Tu, LIANG Hongbin. Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 202-210. doi: 10.3969/j.issn.0258-2724.20170596 |
范平志,周维曦. 高移动无线通信抗多普勒效应技术研究进展[J]. 西南交通大学学报,2016,51(3): 405-417 doi: 10.3969/j.issn.0258-2724.2016.03.001
FAN Pingzhi, ZHOU Weixi. Advances in anti-doppler effect techniques for high mobility wireless communications[J]. Journal of Southwest Jiaotong University, 2016, 51(3): 405-417 doi: 10.3969/j.issn.0258-2724.2016.03.001
|
中国互联网信息中心. 第39次中国互联网络发展状况统计报告[EB/OL]. (2017-01-22)[2017-06-20]. http://www.199it.com/archives/560209.html
|
李瑞轩,董新华,辜希武,等. 移动云服务的数据安全与隐私保护综[J]. 通信学报,2013,34(12): 158-165 doi: 10.3969/j.issn.1000-436x.2013.12.018
LI Ruixuan, DONG Xinhua, GU Xiwu, et al. Overview of the data security and privacy-preserving of mobile cloud services[J]. Journal on Communications, 2013, 34(12): 158-165 doi: 10.3969/j.issn.1000-436x.2013.12.018
|
DELY P, KASSLER A, CHOW L, et.al. A software-defined networking approach for handover management with real-time video in WLANs[J]. Journal of Modern Transportation, 2013, 21: 58-65 doi: 10.1007/s40534-013-0007-x
|
TSAI J L, LO N W. A privacy-aware authentication scheme fordistributed mobile cloud computing services[J]. IEEE Systems Journal, 2015, 9(3): 805-815 doi: 10.1109/JSYST.2014.2322973
|
JIANG Q, MA J F, WEI F S. On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services[J]. IEEE Systems Journal, 2016(99): 4-7
|
刘辉,李晖,马占欣. 一个安全高效的车载网认证方案[J]. 西南交通大学学报,2011,46(2): 315-320 doi: 10.3969/j.issn.0258-2724.2011.02.023
LIU Hui, LI Hui, MA Zhanxin. Efficient and secure authentication scheme for vehicular ad hoc networks[J]. Journal of Southwest Jiaotong University, 2011, 46(2): 315-320 doi: 10.3969/j.issn.0258-2724.2011.02.023
|
LEE S, ONG I, LIM HT, et al. Two factor authentication for cloud computing[J]. International Journal of KIMICS, 2010, 8(4): 427-432
|
CHOUDHURY A J, KUMAR P, SAIN M, et al. A Strong user authentication framework for cloud computing[C]//IEEE Asia -Pacific Services Computing Conference. Jeju Island: IEEE, 2011: 110-115
|
CHEN N, JIANG R. Security analysis and improvement of user authentication framework for cloud computing[J]. Journal of Networks, 2014, 9(1): 198-203
|
WANG R, CHEN S, WANG X F, Signing me onto your accounts through facebook and google: a traffic-guided security study of commercially deployed single-sign-on Web services[C]//Security and Privacy. San Francisco: IEEE, 2012: 365-379
|
Microsoft. Windows live ID[EB/OL]. [2017-03-11]. https://account.live.com/
|
OpenID Foundation, OpenID Authentication 2.0 [EB/OL]. (2007-12-05) [2017-03-11]. http://openid.net/specs/openid-authentication-2_0.html
|
HUGHES J. Profiles for the OASIS security assertion markup language (SAML) V2.0[EB/OL]. (2005-03-17) [2017-06-20]. http://docs.oasis-open.org/security/saml/v2.0/
|
FETT D, KUSTERS R, SCHMITZ G. SPRESSO: a secure privacy-respecting single sign-on system for the Web[C]//The 22nd ACM SIGSAC Conference on Computer and Communications Security. Denver: ACM, 2015: 1358-1369
|
HE D, KUMAR N, KHAN M K, et al. Efficient privacy-aware authentication scheme for mobile cloud computing services[J]. IEEE Systems Journal, 2016, 99: 1-11
|
IRSHAD A, SHER M, AHMAD H F, et al. An improved multi-server authentication scheme for distributed mobile cloud computing services[J]. Ksll Transactions on Internet and Information Systems, 2016, 10(12): 5529-5552
|
ODELU V, DAS A K, KUMARI S, et al. Provably secure authenticated key agreement scheme for distributed mobile cloud computing services[J]. Future Generation Computer Systems, 2017, 68: 74-88 doi: 10.1016/j.future.2016.09.009
|
AMIN R, ISLAM S H, BISWAS G P, et al. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments[J]. Security and Communication Network, 2016, 9(17): 4650-4666 doi: 10.1002/sec.v9.17
|
WANG D, HE D, WANG P, et al. Anonymous two-factor authenticationin distributed systems:certain goals are beyond attainment[J]. IEEE Trans. Dependable Secure Comput., 2015, 12(4): 428-442 doi: 10.1109/TDSC.2014.2355850
|
WANG D, WANG P. On the usability of two-factor authentication[C]//Proc. 10th Int. Conf. Security Privacy Commun. Beijing: [s.n.], 2014: 141-150
|
MA C G, WANG D, ZHAO S D. Security flaws in two improved remote user authentication schemes using smart cards[J]. International Journal of Communication Systems, 2012, 27(10): 2215-2227
|
WANG D, WANG P. Two birds with one stone:two-factor authentication with security beyond conventional bound[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 99: 1545-5971
|
MISHRA D. On the security flaws in ID-based password authentication schemes for telecare medical information systems[J]. Journal of Medical Systems, 2015, 39: 154-169 doi: 10.1007/s10916-014-0154-6
|
ODELU V, DAS A K, GOSWAMI A. A secure biometrics-based multi-server authentication protocol using smart cards[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1953-1966 doi: 10.1109/TIFS.2015.2439964
|
BRICKELL E, LI J. Enhanced privacy ID:a direct anonymousattestation scheme with enhanced revocation capabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(3): 345-360 doi: 10.1109/TDSC.2011.63
|
POINTCHEVAL D, STERN J. Security arguments for digital signatures andblind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396 doi: 10.1007/s001450010003
|
[1] | ZHU Jun, ZHANG Chuanjun, ZHAO Jianfeng, WANG Xuezhu, FU Lin, HUANG Zhiyong, GUO Pengfei. Intelligent Extraction Method of Railway Station Overhead Catenary Wire Features from Point Cloud Guided by Knowledge[J]. Journal of Southwest Jiaotong University. doi: 10.3969/j.issn.0258-2724.20230435 |
[2] | YANG Jun, GAO Zhiming, LI Jintai, ZHANG Chen. Correspondence Calculation of Three-Dimensional Point Cloud Model Based on Attention Mechanism[J]. Journal of Southwest Jiaotong University, 2024, 59(5): 1184-1193. doi: 10.3969/j.issn.0258-2724.20220682 |
[3] | ZHU Jun, CHEN Yidong, ZHANG Yunhao, HUANG Huaping, WU Sihao, ZHAO Li. Visualization Method for Fast Fusion of Panorama and Point Cloud Data in Network Environment[J]. Journal of Southwest Jiaotong University, 2022, 57(1): 18-27. doi: 10.3969/j.issn.0258-2724.20200360 |
[4] | ZHANG Liping, YANG Yu, JIN Feihu, LI Song, HAO Zhongxiao. A Skyline Query Method Based on Differential Privacy Protection[J]. Journal of Southwest Jiaotong University, 2022, 57(5): 982-989. doi: 10.3969/j.issn.0258-2724.20200714 |
[5] | ZHU Qing, WANG Dengxing, WANG Feng, XIE Xiao, HU Han, HUANG Shuang. Automatic Volume Calculation System for Sand and Gravel Carried by Ship Based on LiDAR Point Cloud[J]. Journal of Southwest Jiaotong University, 2020, 55(6): 1199-1206. doi: 10.3969/j.issn.0258-2724.20181051 |
[6] | ZHANG Wenfang, SUN Haifeng, WANG Yu, LIN Wei, WANG Xiaomin. Security and Efficiency Enhanced Authentication Scheme Based on Self-Updated Hash Chain for Train-Ground Communication[J]. Journal of Southwest Jiaotong University, 2020, 55(6): 1171-1180, 1206. doi: 10.3969/j.issn.0258-2724.20190205 |
[7] | LI Yu. I/O Scheduling Algorithm for Data Servers in Cloud Storage Environments[J]. Journal of Southwest Jiaotong University, 2018, 53(4): 857-864. doi: 10.3969/j.issn.0258-2724.2018.04.026 |
[8] | WANG Peijun, LÜ Dongxu, CHEN Peng. Complex Point Cloud Registration and Optimized Data Processing for High-Speed Railway Turnout[J]. Journal of Southwest Jiaotong University, 2018, 53(4): 806-812, 849. doi: 10.3969/j.issn.0258-2724.2018.04.019 |
[9] | HUANG Dingfa, ZHOU Letao, LU Jiankang, MEI Xi, FENG Wei, ZHANG Xi, YAN Li. Key Techniques of GNSS Ground-Based Augmentation System and Location Based Cloud Service[J]. Journal of Southwest Jiaotong University, 2016, 29(2): 388-395. doi: 10.3969/j.issn.0258-2724.2016.02.018 |
[10] | ZHANG Junfeng, XU Dehe, WANG Xiaodong. Management Algorithm of Point-Cloud Data Based on Octree Concerned with Adaptive Levels of Detail[J]. Journal of Southwest Jiaotong University, 2016, 29(1): 78-84. doi: 10.3969/j.issn.0258-2724.2016.01.012 |
[11] | JIANG Lei, LI Xiangbiao, MA Shuwen, ZHOU Liangming, LI Qiqin, DUAN Changde. Registration Method for Point Cloud Based on Feature of One Plane and Two Cylindrical Holes[J]. Journal of Southwest Jiaotong University, 2014, 27(6): 1090-1096. doi: 10.3969/j.issn.0258-2724.2014.06.023 |
[12] | LIU Hui, LI Hui, MA Zhanxin. Efficient and Secure Authentication Scheme for Vehicular Ad Hoc Networks[J]. Journal of Southwest Jiaotong University, 2011, 24(2): 315-520. doi: 10.3969/j.issn.0258-2724.2011.02.023 |
[13] | SONG Jing, CU Jian-Huai. Decision Tree Construction Based on Cloud Transform and Rough Set Theory under Characteristic Relation[J]. Journal of Southwest Jiaotong University, 2010, 23(2): 312-316. doi: 10. 3969/ j. issn. 0258-2724. |
[14] | YANG Jun, ZHU Changqian. Algorithm for Implicit Surface Reconstruction from Point Cloud Data with Noises[J]. Journal of Southwest Jiaotong University, 2008, 21(1): 29-34. |
[15] | WANG Zuocheng, LI Yongshu, XUE Lixia, Wang Linlin. Image Texture Segmentation Based on Cloud Fuzzy Theory[J]. Journal of Southwest Jiaotong University, 2007, 20(5): 548-552. |
[16] | LI Guomin, HE Dake, LU Xianhui, MA Chunbo. Authenticated Group Key Agreement Protocol with Resistance to Leakage of Ephemeral Secret DH Exponents[J]. Journal of Southwest Jiaotong University, 2007, 20(6): 670-674. |
[17] | XUE Li-xia, WANG Zuo-cheng, LI Yong-shu, Wang Lin-lin. Fuzzy Edge Detection Based on Cloud Model[J]. Journal of Southwest Jiaotong University, 2006, 19(1): 85-90. |
[18] | DAI Chaohua, ZHU Yunfang, CHEN Weirong. Cloud Theory-Based Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2006, 19(6): 729-732. |
[19] | LIUPei-shun, HEDa-ke. Application of Proxy Signature to Smart Card Authentication[J]. Journal of Southwest Jiaotong University, 2002, 15(3): 295-298. |
1. | 张丽平,杨玉,金飞虎,李松,郝忠孝. 一种基于差分隐私保护的skyline查询方法. 西南交通大学学报. 2022(05): 982-989 . ![]() | |
2. | 王捷,李晶,罗影. 面向移动云服务的分级访问控制的认证协议. 应用科学学报. 2022(06): 1006-1018 . ![]() | |
3. | 申剑蓉. 简析ADS-B信号实时生成软件设计与实现. 中国新通信. 2022(23): 25-27 . ![]() |