Data outsourcing authentication model based on authenticated data structures for cloud computing
The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were anal...
Saved in:
Main Authors: | XU Jian1, ZHOU Fu-cai1, CHEN Xu1, ZHU Zhi-liang2 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74419316/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Mutual authentication scheme based on the TPM cloud computing platform
by: Zhen-peng LIU, et al.
Published: (2012-11-01) -
Provable data possession scheme with authentication
by: Hao-xing LI, et al.
Published: (2016-10-01) -
Cloud computing based smartphone social authentication system
by: Yan-bing LIU, et al.
Published: (2012-09-01) -
UCAP:a PCL secure user authentication protocol in cloud computing
by: Xuefeng LI, et al.
Published: (2018-08-01) -
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
by: Chiyo Miyazawa, et al.
Published: (2024-03-01)