期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
ID-Based User Authentication Scheme for Cloud Computing 被引量:1
1
作者 ping-liang chen Jen-Ho Yang Ching-I Lin 《Journal of Electronic Science and Technology》 CAS 2013年第2期221-224,共4页
In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an i... In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et aL's scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice. 展开更多
关键词 ANONYMITY cloud computing identity-based scheme user authentication user identity.
下载PDF
Solving Dynamic Spectrum Management Problem Based on Cloud Computing Using Genetic Algorithm
2
作者 ping-liang chen Yu-cheng Lin Shin-Jia chen 《Journal of Electronic Science and Technology》 CAS 2013年第2期132-139,共8页
With the rapid development of wireless sensor network (WSN), the demands of limited radio frequency spectrum rise sharply, thereby dealing with the frequency assignment of WSN scientifically and efficiently becomes ... With the rapid development of wireless sensor network (WSN), the demands of limited radio frequency spectrum rise sharply, thereby dealing with the frequency assignment of WSN scientifically and efficiently becomes a popular topic. To improve the frequency utilization rate in WSN, a spectrum management system for WSN combined with cloud computing technology should be considered. From the optimization point of view, the study of dynamic spectrum management can be divided into three kinds of methods, including Nash equilibrium, social utility maximization, and competitive economy equilibrium. In this paper, we propose a genetic algorithm based approach to allocate the power spectrum dynamically. The objective is to maximize the sum of individual Shannon utilities with the background interference and crosstalk consideration. Compared to the approach in [1], the experimental result shows better balance between efficiency and effectiveness of our approach. 展开更多
关键词 Terms-Background interference cloudcomputing CROSSTALK dynamic spectrum management genetic algorithm Shannon utility wireless sensornetwork.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部