http://iet.metastore.ingenta.com
1887

access icon free Special Issue on Trust and Identity Management in Mobile and Internet Computing and Communications

  • XML
    17.017578125Kb
  • PDF
    50.26953125Kb
  • HTML
    15.8251953125Kb
Loading full text...

Full text loading...

/deliver/fulltext/iet-ifs/7/1/IET-IFS.2013.0043.html;jsessionid=133z9ewdflm7h.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-ifs.2013.0043&mimeType=html&fmt=ahah

References

    1. 1)
      • C. Li . A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf. Secur. , 1 , 3 - 10
    2. 2)
      • K. Peng . Efficient proof of bid validity with untrusted verifier in homomorphic e-auction. IET Inf. Secur. , 1 , 11 - 21
    3. 3)
      • Y. Deng , G. Wang , J. Cao , X. Xin . Practical secure and fast handoff framework for pervasive Wi-Fi access. IET Inf. Secur. , 1 , 22 - 29
    4. 4)
      • X. Huang , B. Chen , A. Markham , Q. Wang , Z. Yan , A.W. Roscoe . Human interactive secure key and identity exchange protocols in body sensor networks. IET Inf. Secur. , 1 , 30 - 38
    5. 5)
      • X. Li , J. Du . Adaptive and attribute-based trust model for SLA guarantee in cloud computing. IET Inf. Secur. , 1 , 39 - 50
    6. 6)
      • W. Qiang , D. Zou , L.T. Yang , H. Jin . CloudAC: A cloud-oriented multilayer access control system for logic virtual domain. IET Inf. Secur. , 1 , 51 - 59
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2013.0043
Loading

Related content

content/journals/10.1049/iet-ifs.2013.0043
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address