[1]
D. Svantesson, R. Clarke: Privacy and consumer risks in cloud computing, , Computer Law & Security Review, 26(4) 391-397 (2010).
DOI: 10.1016/j.clsr.2010.05.005
Google Scholar
[2]
OpenID, http: /en. wikipedia. org/wiki/OpenID.
Google Scholar
[3]
OpenID: introduction and how to for non-techies, http: /www. consumingexperience. com/2006/12/openid-introduction. html.
Google Scholar
[4]
Attribute Exchange Security Alert, http: /openid. net/2011/05/05/attribute-exchange-security-alert.
Google Scholar
[5]
Cloud Computing and User Authentication, http: /blogs. msdn. com/b/dachou/archive/2008/08/19/cloud-computing-and-user-authentication. aspx.
Google Scholar
[6]
Strong user authentication on the web, http: /msdn. microsoft. com/en-us/library/cc838351. aspx.
Google Scholar
[7]
B. Ohlman, A. Eriksson, R. Rembarz: What networking of Information can do for cloud computing, "in: IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE, 09, 78-83.
DOI: 10.1109/wetice.2009.27
Google Scholar
[8]
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, , Future Generation Computer Systems, 25(6) 599-616 (2009).
DOI: 10.1016/j.future.2008.12.001
Google Scholar
[9]
S. Subashini, V. Kavitha: A survey on security issues in service delivery models of cloud computing, , Journal of Network and Computer Applications, 34(1) 1-11(2011).
DOI: 10.1016/j.jnca.2010.07.006
Google Scholar
[10]
F.Y. Yang, C.M. Liao: A Provably Secure and Efficient Strong Designated Verifier Signature Scheme, , International Journal of Network Security, 10(3) 223-227 (2010).
DOI: 10.1109/nbis.2014.20
Google Scholar
[11]
M. Rasslan, A. Youssef: Comments on the security of Chen's authenticated encryption scheme, , Computers and Electrical Engineering, 37(1) 71-74 (2011).
DOI: 10.1016/j.compeleceng.2010.09.001
Google Scholar
[12]
C.C. Chang, J.S. Lee: An anonymous voting mechanism based on the key exchange protocol, , Computers & Security, 25(4) 307-314 (2006).
DOI: 10.1016/j.cose.2006.02.004
Google Scholar