References
[1]. Jaidhar. C.D, (2013). “ Enhanced Mutual
rd Authentication Scheme for Cloud Architecture”, 3 IEEE
International Advance Computing Conference (IACC),
Ghaziabad, pp.70-75.
[2]. Zhong. S, Hao. Z, N. Yu, (2011). “A Time Bound Ticket-
Based Mutual Authentication Scheme for Cloud
Computing”, International Journal of Computers,
Communications and Control (IJCCC), Vol.6(2), pp.227–235.
[3]. Lin. I.C, Chang. C.C, (2009). “A countable and Time
Bound Password-Based User Authentication Scheme for
the Applications of Electronic Commerce”, Information
Sciences, Vol.179, pp.1269 – 1277.
[4]. Chang. E.C and Xu. J, (2008). “Remote Integrity
th Check with Dishonest Storage Server”, 13 European
Symposium on Research in Computer Security,
pp.223–237.
[5]. Wen. F, Li. X, Cui. S, (2011). "An Improved Dos-Resistant
Id-Based Password Authentication Scheme Without Using
Smart Card", Springer Journal of Electronics, Vol.28(4-6),
pp.580-586.
[6]. Yoon. E.J, and Yoo. K.Y, (2013). "Robust Biometrics
Based Multi Server Authentication with Key Agreement
Scheme for Smart Cards on Elliptic Curve Cryptosystem",
Springer Journal of Super computing, Vol.63, pp.235–255.
[7]. Mishra. D, Kumar. V, Mukhopadhyay. S, (2013). "A
Pairing Free Identity Based Authentication Framework for
Cloud Computing,” Springer Verlag Berlin Heidelberg,
Vol.7873, pp.721-727.
[8]. Lee. C.C, Li. C.T, Weng. C.Y, Jheng. J.J, Zhang. X.Q,
Zhu. Y.R, (2013). "Cryptanalysis and Improvement of an
ECC Based Password Authentication Scheme Using Smart
Cards,” Springer International Publishing Switzerland,
Vol.8300, pp.338–348.
[9]. Das. A.K, Odelu. V, Goswami. A, (2014). "A Robust and
Effective Smart Card Based Remote User Authentication
Mechanism Using Hash Function”, Hindawi Publishing
Corporation, The Scientific World Journal, Vol.2014, pp.1-
16.
[10]. Liao. C.H, Chen. H.C, Wang. C.T, (2009). "An Exquisite
Mutual Authentication Scheme with Key Agreement Using
Smart Card", Informatica, Vol.33, pp.125–132.
[11]. Lee. C.C, Li. C.T, Wu. P.H, (2014). "A Novel Frequency
Billing Service in Digital Television System”, Journal of
Information Hiding and Multimedia Signal Processing,
Vol.5(3), pp.439-450.