Secure OpenID Authentication Model by Using Trusted Computing
The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous acco...
Saved in:
Main Authors: | E. Ghazizadeh, Z. S. Shams Dolatabadi, R. Khaleghparast, M. Zamani, A. A. Manaf, M. S. Abdullah |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | Abstract and Applied Analysis |
Online Access: | http://dx.doi.org/10.1155/2014/561487 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Trusted Computing Strengthens Cloud Authentication
by: Eghbal Ghazizadeh, et al.
Published: (2014-01-01) -
ID-based wireless authentication scheme with anonymity
by: ZHU Hui, et al.
Published: (2009-01-01) -
ID-based signature without trusted PKG
by: ZHOU Liang1, et al.
Published: (2008-01-01) -
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
by: Ruikang Zhou, et al.
Published: (2016-03-01) -
Direct anonymous authentication scheme for wireless networks under trusted computing
by: YANG Li1, et al.
Published: (2010-01-01)