Ping-Liang Chen, Jen-Ho Yang, Ching-I Lin. ID-Based User Authentication Scheme for Cloud Computing[J]. Journal of Electronic Science and Technology, 2013, 11(2): 221-224. DOI: 10.3969/j.issn.1674-862X.2013.02.017
Citation:
|
Ping-Liang Chen, Jen-Ho Yang, Ching-I Lin. ID-Based User Authentication Scheme for Cloud Computing[J]. Journal of Electronic Science and Technology, 2013, 11(2): 221-224. DOI: 10.3969/j.issn.1674-862X.2013.02.017
|
Ping-Liang Chen, Jen-Ho Yang, Ching-I Lin. ID-Based User Authentication Scheme for Cloud Computing[J]. Journal of Electronic Science and Technology, 2013, 11(2): 221-224. DOI: 10.3969/j.issn.1674-862X.2013.02.017
Citation:
|
Ping-Liang Chen, Jen-Ho Yang, Ching-I Lin. ID-Based User Authentication Scheme for Cloud Computing[J]. Journal of Electronic Science and Technology, 2013, 11(2): 221-224. DOI: 10.3969/j.issn.1674-862X.2013.02.017
|