您当前的位置:
首页 >
文章列表页 >
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Academic communication | 更新时间:2024-06-05
    • Integrity checking protocol with identity-based proxy signature in mobile cloud computing

    • Journal on Communications   Vol. 36, Issue 10, Pages: 278-286(2015)
    • DOI:10.11959/j.issn.1000-436x.2015232    

      CLC: TP393
    • Online First:2015-10

      Published:25 October 2015

    移动端阅览

  • Li YAN, Run-hua SHI, Hong ZHONG, et al. Integrity checking protocol with identity-based proxy signature in mobile cloud computing[J]. Journal on Communications, 2015, 36(10): 278-286. DOI: 10.11959/j.issn.1000-436x.2015232.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1460

下载量

1

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
Analysis and improvement on identity-based cloud data integrity verification scheme
Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing
Lightweight integrity verification scheme for cloud based group data

Related Author

Shuyu WANG
Meiping ZHANG
Zhenping ZHANG
Jianwei CHEN
Dawei WEI
Jianfeng MA
Lei HE
Ruchuan WANG

Related Institution

Fujian Provincial Key Laboratory of Network Security and Cryptology
College of Computer and Cyber Security, Fujian Normal University
Shaanxi Key Laboratory of Network and System Security, Xidian University
School of Cyber Engineering, Xidian University
College of Computer and Communication Engineering, Zhengzhou University of Light Industry
0