Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Comparative Study on Authentication Schemes for Cloud Computing Shikha Choksi © 2014 IJEDR | Volume 2, Issue 2 | ISSN: 2321-9939.
    2. A Novel Digital Content Protection Scheme Combining Iris Identity Based Digital Signature and Semi-fragile Watermark,Meihua Wang,Kefeng Fan,Xiaoji Li, Qingning Zeng
    3. Yassin, A.A.; Hai J.; Ibrahim, A.; Weizhong Q. and Deqing Z., "A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing", Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 IEEE 26th International, pp.1210-1217, 21-25 May 2012
    4. An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation Jiangshan Yu, Guilin Wang, Yi Mu, Senior Member, IEEE, and Wei Gao
    5. User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services,Reza Fathi ∗ , Mohsen Amini Salehi † , and Ernst L. Leiss .2015 IEEE 8th International Conference on Cloud Computing.
    6. Tianfield, H., "Security issues in cloud computing", Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on, pp.1082-1089, 14-17 Oct. 2012.
    7. Lamport, L., "Password Authentication with Insecure Communication", Communications of the ACM 24.11, pp.770-772, Nov. 1981.
    8. Choudhury, A.; Kumar, P.; Sain, M.; Lim, H. and Hoon Jae-Lee, "A Strong User Authentication Framework for Cloud Computing", Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific, pp.110-115, 12-15 Dec. 2011
    9. Xuguang, R. and Xin-Wen, W., "A novel dynamic user authentication", Communications and Information Technologies (ISCIT), 2012 International Symposium on, pp.713-717, 2-5 Oct. 2012.
    10. Forouzan, B., Cryptography and Network Security (Sie), Tata McGraw-Hill Education, 2011, pp.416-421, ISBN 9780070660465.
    11. Guo, M.; Liaw, H.; Hsiao, L.; Huang, C.; and Yen, C., "Authentication using graphical password in cloud", Wireless Personal Multimedia Communications (WPMC), 2012 15th International Symposium on , pp.177-181, 24-27 Sept. 2012.
    12. Khitrov M., "Talking passwords: voice biometrics for data access and security", Biometric Technology Today, Volume 2013, Issue 2, February 2013, Pages 9-11, ISSN 0969-4765, http://dx.doi.org/10.1016/S0969- 4765(13)70036-5.
    13. M'Raihi, D., Bellare, M., Hoornaert, F., Naccache, D., and O. Ranen, "HOTP: An HMAC-Based One-Time Password Algorithm", RFC 4226, December 2005.
    14. D., M'Raihi, S., Machani, M., Pei and J., Rydell, "TOTP: Time-Based One-Time Password Algorithm", RFC 6238, May 2011.
    15. Chen, T.; Yeh, H. and Shih, W., "An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing", Multimedia and Ubiquitous Engineering (MUE), 2011 5th FTRA International Conference on, pp.155-159, 28-30 June 2011.
    16. Yassin, A.A.; Hai J.; Ibrahim, A.; Weizhong Q. and Deqing Z., "A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing", Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 IEEE 26th International, pp.1210-1217, 21-25 May 2012.
    17. Jaidhar, C.D., "Enhanced Mutual Authentication Scheme for Cloud Architecture", Advance Computing Conference (IACC), 2013 IEEE 3rd International, pp.70-75, 22-23 Feb. 2013 doi: 10.1109/IAdCC.2013.6514197.

Recent Article