[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83. (FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1): 71-83.) [2] ZISSIS D, LEKKAS D. Addressing cloud computing security issues[J]. Future Generation Computer Systems, 2012, 28(3): 583-592. [3] FENG T, LIU Z, KWON K A, et al. Continuous mobile authentication using touch screen gestures[C]//Proceedings of the 2012 IEEE Conference on Homeland Security. Piscataway,NJ: IEEE, 2012: 451-456. [4] TROJAHN M, ORTMEIER F. Toward mobile authentication with keystroke dynamics on mobile phones and tablets[C]//WAINA'13: Proceedings of the 201327th International Conference on Advanced Information Networking and Applications Workshops. Washington, DC: IEEE Computer Society, 2013: 697-702. [5] CHEN C-L, LEE C-C, HSU C-Y. Mobile device integration of a fingerprint biometric remote authentication scheme[J]. International Journal of Communication Systems, 2012, 25(5): 585-597. [6] BRAINARD J, JUELS A, RIVEST R L, et al. Fourth-factor authentication: somebody you know[C]//CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 168-178. [7] SOLEYMANI B, MAHESWARAN M. Social authentication protocol for mobile phones[C]//CSE'09: Proceedings of the 2009 International Conference on Computational Science and Engineering. Washington, DC: IEEE Computer Society, 2009, 4: 436-441. [8] ZHAN J, FANG X. Authentication using multi-level social networks[M]//Knowledge Discovery, Knowledge Engineering and Knowledge Management. Berlin: Springer, 2011: 35-49. [9] 刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(Z1):28-34. (LIU Y B, LIU F F. Cloud computing based smartphone social authentication system[J]. Journal on Communications, 2012, 33(Z1): 28-34.) [10] 张晓伟.在线社交网络下基于信任度的消息传播模型[J].计算机应用,2014,34(2):411-416. (ZHANG X W. Trust-based information propagation model in online social networks[J]. Journal of Computer Applications, 2014, 34(2): 411-416.) [11] BHUIYAN T, XU Y, JOSANG A. Integrating trust with public reputation in location-based social networks for recommendation making[C]//WI-IAT'08: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology. Washington, DC: IEEE Computer Society, 2008, 3: 107-110. [12] 雷环,彭舰.SNS中结合声誉与主观逻辑的信任网络分析[J].计算机应用研究,2010,27(6):2321-2323.(LEI H, PENG J. Integrating reputation and subjective logic to analyze trust network in SNS[J]. Application Research of Computers, 2010, 27(6): 2321-2323.) [13] 乔秀全,杨春,李晓峰,等.社交网络服务中一种基于用户上下文的信任度计算方法[J].计算机学报,2011,34(12):2403-2413. (QIAO X Q, YANG C, LI X F, et al. A trust calculating algorithm based on social networking service users context[J]. Chinese Journal of Computers, 2011, 34(12): 2403-2413.) [14] HE D, CHEN J, HU J. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security[J]. Information Fusion, 2012, 13(3): 223-230. [15] 舒剑.高效的强安全的基于身份认证密钥协商协议[J].计算机应用,2012,32(1):95-98. (SHU J. Efficient strongly-secure identity-based authenticated key agreement protocol[J]. Journal of Computer Applications, 2012, 32(1): 95-98.) [16] SU B-Z, WU W-L, ZHANG W-T. Security of the SMS4 block cipher against differential cryptanalysis[J]. Journal of Computer Science and Technology, 2011, 26(1): 130-138. [17] 冯登国.可证明安全性理论与方法研究[J].软件学报,2006,16(10):1743-1756. (FENG D G. Research on theory and approach of provable security[J]. Journal of Software, 2006, 16(10): 1743-1756.) [18] 王正才,许道云,王晓峰,等.BAN逻辑的可靠性分析与改进[J].计算机工程,2012,38(17):110-115. (WANG Z C, XU D Y, WANG X F, et al. Reliability analysis and improvement of BAN logic[J]. Computer Engineering, 2012, 38(17): 110-115.) |