[1]
Kang Chen, Weiming Zheng. Cloud Computing: System Instances and Current Research, Journal of Software, vol. 20, pp.1337-1348, (2009).
DOI: 10.3724/sp.j.1001.2009.03493
Google Scholar
[2]
Junzhou Luo, Jiahui Jin, Aibo Song, et al. Cloud Computing: Architecture and Key Technologies, Journal on Communications, vol. 32, pp.3-21, (2011).
Google Scholar
[3]
Dengguo Feng, Min Zhang, Yang Zhang, et al. Study on Cloud Computing Security, Journal of Software, vol. 22, pp.71-83, (2011).
Google Scholar
[4]
Dengguo Feng, Yu Qin, Dan Wang, et al. Research on Trusted Computing Technology, Journal of Computer Research and Development, vol. 48, pp.1332-1349, (2011).
Google Scholar
[5]
Towards Trusted Cloud Computing, http: /www. usenix. org/events/hotcloud09/tech/full_papers/santos. pdf. (2009).
Google Scholar
[6]
Xian Xu, Yu Long, Xian Ping Mao. Research on TPM based Strong ID Authentication Protocol, Computer Engineering, vol. 38, pp.23-27, (2012).
Google Scholar
[7]
Li Yang, Jianfeng Ma. Trusted Mutual Authentication Scheme with Smart Cards and Passwords, Journal of University of Electronic Science and Technology of China, vol. 40, pp.128-133, (2011).
Google Scholar
[8]
Tien Ho Chen, Han Cheng Hsiang, Wei Kuan Shih. Security Enhancement on An Improvement on Two Remote User Authentication Schemes Using Smart Cards, Future Generation Computer Systems, vol. 27, pp.377-380, (2011).
DOI: 10.1016/j.future.2010.08.007
Google Scholar
[9]
Wen Shenq Juang. Efficient Password Authenticated Key Agreement Using Smart Card, Computer and Security, vol. 23, pp.167-173, (2004).
DOI: 10.1016/j.cose.2003.11.005
Google Scholar
[10]
Chun I Fan, Yihui Lin and Ruei Hau Hsu. Remote Password Authentication Scheme with Smart Cards and Biometrics, Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM¢06). San Francisco, CA, USA: IEEE Press, 2006, pp.1-5.
DOI: 10.1109/glocom.2006.278
Google Scholar
[11]
S. Santhosh Baboo, K. Gokulraj. An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks, Computer Network and Information Security, vol. 4, pp.30-38, (2012).
DOI: 10.5815/ijcnis.2012.04.04
Google Scholar