Citation: | FAN Kai, DENG Hai, LI Hui, et al., “Privacy Protection Smartcard Authentication Scheme in Cloud Computing,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 41-45, 2018, doi: 10.1049/cje.2017.10.002 |
D. Zissis and D. Lekkas, "Addressing cloud computing security issues", Future Generation Computer Systems, Vol.28, No.3, pp.583-592, 2012.
|
F. Wen, X. Li and S. Cui, "An improved dos-resistant id-based password authentication scheme without using smartcar", Journal of Electronics (China), Vol.28, No.4, pp.580-586, 2011.
|
K. Fan, J. Li, H. Li, et al., "RSEL:Revocable secure efficient lightweight RFID authentication scheme", Concurrency and Computation:Practice and Experience, Vol.26, No.5, pp.1084-1096, 2014.
|
K. Fan, Y. Gong, Ch. Liang, et al., "Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G", Security and Communication Network, Wiley Online Library, DOI:10.1002/sec.1314, 2015.
|
C.D. Jaidhar, "Enhanced mutual authentication scheme for cloud architecture", 3rd International Advance Computing Conference, pp.70-75, 2013.
|
M. Sarvabhatla and C.S. Vorugunti, "A robust mutual authentication scheme for data security in cloud architecture", Future Information Security Workshop COMSNETS, pp.1-6, 2015.
|
L. Lamport, "Password authentication with insecure communication", Communications of the ACM, Vol.24, No.11, pp.770-772, 1981.
|
M.S. Hwang and L.H. Li, "A new remote user authentication scheme using smartcards", IEEE Transactions on Consumer Electronics, Vol.46, No.1, pp.28-30, 2000.
|
C.K. Chan and L.M. Cheng, "Cryptanalysis of a remote user authentication scheme using smartcards", IEEE Transactions on Consumer Electronics, Vol.46, No.4, pp.992-993, 2000.
|
R. Song, "Advanced smartcard based password authentication protocol", Computer Standards Interfaces, Vol.32, No.5-6, pp.321-325, 2010.
|
A. Singhal and M. Ramaiya, "A novel safe and efficient smartcard authentication scheme using hash function", Engineering Universe for Scientific Research and Management, Vol.7, No.1, pp.1-6, 2015.
|
T.S. Messerges, E.A. Dabbish and R.H. Sloan, "Examing smartcard security under the threat of power analysis attacks", IEEE Transactions on Computers, Vol.5, No.3, pp.514-522, 2002.
|
J. Wang, H. Zhao et al., "Formal analysis of information card federated identity-management protocol", Chinese Journal of Electronics, Vol.22, No.1, pp.83-88, 2013.
|