An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment
With the popularity of cloud computing, information security issues in the cloud environment are becoming more and more prominent. As the first line of defense to ensure cloud computing security, user authentication has attracted extensive attention. Though considerable efforts have been paid for a...
Main Authors: | Chenyu Wang, Ke Ding, Bin Li, Yiming Zhao, Guoai Xu, Yanhui Guo, Ping Wang |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2018/3048697 |
Similar Items
-
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
by: Chenyu Wang, et al.
Published: (2017-12-01) -
The Deniable Authentication Protocol And Electronic Voting Scheme Using The Elliptic Curve Cryptosystem
by: Jing-cheng Huang, et al.
Published: (2007) -
Elliptic Curve Cryptosystems
by: Chieh Wang, et al.
Published: (2003) -
Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
by: Juan Qu, et al.
Published: (2014-01-01) -
Elliptic curve cryptosystems
by: Saeki, Mugino.
Published: (1997)