access icon free Special Issue on Trust and Identity Management in Mobile and Internet Computing and Communications

There is no abstract available for this article.

Inspec keywords: security of data; mobile computing; trusted computing; Internet

Other keywords: communications; IET information security; mobile computing; trust management; identity management; Internet computing

Subjects: Mobile, ubiquitous and pervasive computing; Internet software; Data security; Mobile radio systems

References

    1. 1)
      • 1. Li, C.: ‘A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card’, IET Inf. Secur., 2013, 7, (1), pp. 310.
    2. 2)
      • 2. Peng, K.: ‘Efficient proof of bid validity with untrusted verifier in homomorphic e-auction’, IET Inf. Secur., 2013, 7, (1), pp. 1121.
    3. 3)
      • 4. Huang, X., Chen, B., Markham, A., Wang, Q., Yan, Z., Roscoe, A.W.: ‘Human interactive secure key and identity exchange protocols in body sensor networks’, IET Inf. Secur., 2013, 7, (1), pp. 3038.
    4. 4)
      • 3. Deng, Y., Wang, G., Cao, J., Xin, X.: ‘Practical secure and fast handoff framework for pervasive Wi-Fi access’, IET Inf. Secur., 2013, 7, (1), pp. 2229.
    5. 5)
      • 5. Li, X., Du, J.: Adaptive and attribute-based trust model for SLA guarantee in cloud computing, IET Inf. Secur., 2013, 7, (1), pp. 3950.
    6. 6)
      • 6. Qiang, W., Zou, D., Yang, L.T., Jin, H.: ‘CloudAC: A cloud-oriented multilayer access control system for logic virtual domain’, IET Inf. Secur., 2013, 7, (1), pp. 5159.
    7. 7)
      • X. Huang , B. Chen , A. Markham , Q. Wang , Z. Yan , A.W. Roscoe . Human interactive secure key and identity exchange protocols in body sensor networks. IET Inf. Secur. , 1 , 30 - 38
    8. 8)
      • Y. Deng , G. Wang , J. Cao , X. Xin . Practical secure and fast handoff framework for pervasive Wi-Fi access. IET Inf. Secur. , 1 , 22 - 29
    9. 9)
      • K. Peng . Efficient proof of bid validity with untrusted verifier in homomorphic e-auction. IET Inf. Secur. , 1 , 11 - 21
    10. 10)
      • W. Qiang , D. Zou , L.T. Yang , H. Jin . CloudAC: A cloud-oriented multilayer access control system for logic virtual domain. IET Inf. Secur. , 1 , 51 - 59
    11. 11)
      • C. Li . A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf. Secur. , 1 , 3 - 10
    12. 12)
      • X. Li , J. Du . Adaptive and attribute-based trust model for SLA guarantee in cloud computing. IET Inf. Secur. , 1 , 39 - 50
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2013.0043
Loading

Related content

content/journals/10.1049/iet-ifs.2013.0043
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading