Chang et al., 2015
| Publication | Publication Date | Title |
|---|---|---|
| US12244739B2 (en) | Confidential authentication and provisioning | |
| CN111639361B (en) | A block chain key management method, multi-person co-signature method and electronic device | |
| Xue et al. | Private blockchain-based secure access control for smart home systems. | |
| Wang et al. | EIDM: A ethereum-based cloud user identity management protocol | |
| Yang et al. | Provable data possession of resource-constrained mobile devices in cloud computing | |
| EP3585032B1 (en) | Data security service | |
| Zhou et al. | EverSSDI: blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts | |
| Ghaffar et al. | An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems | |
| David et al. | Cloud Security Service for Identifying Unauthorized User Behaviour. | |
| Tsai et al. | New dynamic ID authentication scheme using smart cards | |
| KR20200034728A (en) | Computer-implemented system and method to enable secure storage of large-scale blockchain through multiple storage nodes | |
| Darwish et al. | Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm | |
| CN107359998A (en) | A kind of foundation of portable intelligent password management system and operating method | |
| Bouchaala et al. | Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card | |
| Yan et al. | Integrity audit of shared cloud data with identity tracking | |
| CN112037870B (en) | Double-server light-weight searchable encryption method and system supporting data partitioning | |
| Huang et al. | An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture | |
| Chang et al. | A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment | |
| Fugkeaw et al. | Secure and fine-grained access control with optimized revocation for outsourced IoT EHRs with adaptive load-sharing in fog-assisted cloud environment | |
| Tiwari et al. | ACDAS: Authenticated controlled data access and sharing scheme for cloud storage | |
| Ghaffar et al. | A lightweight and efficient remote data authentication protocol over cloud storage environment | |
| Li et al. | Secure data access and sharing scheme for cloud storage | |
| Andola et al. | An enhanced smart card and dynamic ID based remote multi-server user authentication scheme | |
| Hussain et al. | An improved authentication scheme for digital rights management system | |
| Kunal et al. | Securing patient data in the healthcare industry: a blockchain-driven protocol with advanced encryption |