Research on quantum authentication methods for the secure access control among three elements of cloud computing
From MaRDI portal
Publication:2400196
DOI10.1007/s10773-016-3132-6zbMath1371.81090OpenAlexW2516851980MaRDI QIDQ2400196
Yumin Dong, Shufen Xiao, Hong-Yang Ma, Li-Bo Chen
Publication date: 28 August 2017
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-016-3132-6
Related Items (2)
Global convergence of ADMM in nonconvex nonsmooth optimization ⋮ GAITA: a Gauss-Seidel iterative thresholding algorithm for \(\ell_q\) regularized least squares regression
Cites Work
- Quantum image encryption based on generalized affine transform and logistic map
- Quantum image encryption algorithm based on image correlation decomposition
- Quantum image encryption based on generalized Arnold transform and double random-phase encoding
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
- Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
This page was built for publication: Research on quantum authentication methods for the secure access control among three elements of cloud computing