Special Issue on Trust and Identity Management in Mobile and Internet Computing and Communications
- Author(s): Zheng Yan 1 ; Guojun Wang 2 ; Robert H. Deng 3 ; Audun Jøsang 4
-
-
View affiliations
-
Affiliations:
1:
State Key Lab of ISN, Xidian University, China/Aalto University, Finland;
2: Central South University, China;
3: Singapore Management University, Singapore;
4: University of Oslo, Norway
-
Affiliations:
1:
State Key Lab of ISN, Xidian University, China/Aalto University, Finland;
- Source:
Volume 7, Issue 1,
March 2013,
p.
1 – 2
DOI: 10.1049/iet-ifs.2013.0043 , Print ISSN 1751-8709, Online ISSN 1751-8717
- « Previous Article
- Table of contents
- Next Article »
© The Institution of Engineering and Technology
Received
29/01/2013,
Accepted
29/01/2013,
Published
There is no abstract available for this article.
Inspec keywords: security of data; mobile computing; trusted computing; Internet
Other keywords: communications; IET information security; mobile computing; trust management; identity management; Internet computing
Subjects: Mobile, ubiquitous and pervasive computing; Internet software; Data security; Mobile radio systems
References
-
-
1)
-
1. Li, C.: ‘A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card’, IET Inf. Secur., 2013, 7, (1), pp. 3–10.
-
-
2)
-
2. Peng, K.: ‘Efficient proof of bid validity with untrusted verifier in homomorphic e-auction’, IET Inf. Secur., 2013, 7, (1), pp. 11–21.
-
-
3)
-
4. Huang, X., Chen, B., Markham, A., Wang, Q., Yan, Z., Roscoe, A.W.: ‘Human interactive secure key and identity exchange protocols in body sensor networks’, IET Inf. Secur., 2013, 7, (1), pp. 30–38.
-
-
4)
-
3. Deng, Y., Wang, G., Cao, J., Xin, X.: ‘Practical secure and fast handoff framework for pervasive Wi-Fi access’, IET Inf. Secur., 2013, 7, (1), pp. 22–29.
-
-
5)
-
5. Li, X., Du, J.: Adaptive and attribute-based trust model for SLA guarantee in cloud computing, IET Inf. Secur., 2013, 7, (1), pp. 39–50.
-
-
6)
-
6. Qiang, W., Zou, D., Yang, L.T., Jin, H.: ‘CloudAC: A cloud-oriented multilayer access control system for logic virtual domain’, IET Inf. Secur., 2013, 7, (1), pp. 51–59.
-
-
7)
- X. Huang , B. Chen , A. Markham , Q. Wang , Z. Yan , A.W. Roscoe . Human interactive secure key and identity exchange protocols in body sensor networks. IET Inf. Secur. , 1 , 30 - 38
-
8)
- Y. Deng , G. Wang , J. Cao , X. Xin . Practical secure and fast handoff framework for pervasive Wi-Fi access. IET Inf. Secur. , 1 , 22 - 29
-
9)
- K. Peng . Efficient proof of bid validity with untrusted verifier in homomorphic e-auction. IET Inf. Secur. , 1 , 11 - 21
-
10)
- W. Qiang , D. Zou , L.T. Yang , H. Jin . CloudAC: A cloud-oriented multilayer access control system for logic virtual domain. IET Inf. Secur. , 1 , 51 - 59
-
11)
- C. Li . A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf. Secur. , 1 , 3 - 10
-
12)
- X. Li , J. Du . Adaptive and attribute-based trust model for SLA guarantee in cloud computing. IET Inf. Secur. , 1 , 39 - 50
-
1)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2013.0043
Related content
content/journals/10.1049/iet-ifs.2013.0043
pub_keyword,iet_inspecKeyword,pub_concept
6
6