Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Identity-based authentication for cloud computing
Cloud computing is a recently developed new technology for complex systems with massive-
scale services sharing among numerous users. Therefore, authentication of both users and …
scale services sharing among numerous users. Therefore, authentication of both users and …
Ensure hierarchal identity based data security in cloud environment
Cloud computing has emerged as a new promising field in the internet. It can be thought as
a new architecture for the next generation of IT enterprises. It allows the user to access …
a new architecture for the next generation of IT enterprises. It allows the user to access …
Transformation-based framework for record matching
A Arasu, S Chaudhuri, R Kaushik - 2008 IEEE 24th …, 2008 - ieeexplore.ieee.org
Today's record matching infrastructure does not allow a flexible way to account for synonyms
such as" Robert" and" Bob" which refer to the same name, and more general forms of string …
such as" Robert" and" Bob" which refer to the same name, and more general forms of string …
Identity-based cryptography for grid security
HW Lim, KG Paterson - International Journal of Information Security, 2011 - Springer
The majority of current security architectures for grid systems use public key infrastructure
(PKI) to authenticate identities of grid members and to secure resource allocation to these …
(PKI) to authenticate identities of grid members and to secure resource allocation to these …
Identity-based cryptography for cloud security
Cloud computing is a style of computing in which dynamically scalable and commonly
virtualized resources are provided as a service over the Internet. This paper, first presents a …
virtualized resources are provided as a service over the Internet. This paper, first presents a …
[PDF][PDF] Efficient certificateless authentication and key agreement (CL-AK) for grid computing.
Most of the current security architectures for grid systems use conventional public key
infrastructure (PKI) to authenticate grid members and to secure resource allocation to these …
infrastructure (PKI) to authenticate grid members and to secure resource allocation to these …
An identity-based security infrastructure for cloud environments
C Schridde, T Dörnemann, E Juhnke… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
This paper presents a novel security infrastructure for deploying and using service-oriented
Cloud applications securely without having to face the complexity associated with certificate …
Cloud applications securely without having to face the complexity associated with certificate …
[PDF][PDF] On the application of identity-based cryptography in grid security
HW Lim - 2006 - core.ac.uk
This thesis examines the application of identity-based cryptography (IBC) in designing
security infrastructures for grid applications. In this thesis, we propose a fully identity-based …
security infrastructures for grid applications. In this thesis, we propose a fully identity-based …
Architecture and performance evaluation of 3D CMOS-NEM FPGA
In this paper, we introduce a reconfigurable architecture, named 3D CMOS-NEM FPGA,
which utilizes Nanoelectromechanical (NEM) relays and 3D integration techniques …
which utilizes Nanoelectromechanical (NEM) relays and 3D integration techniques …
Identity-based authentication protocol for grid
L Hongwei, S Shixin, Y Haomiao - Journal of Systems Engineering and …, 2008 - Elsevier
Current grid authentication frameworks are achieved by applying the standard SSL
authentication protocol (SAP). The authentication process is very complicated, and …
authentication protocol (SAP). The authentication process is very complicated, and …