P Wang, Z Zhou - Cloud Computing and Security: Third International …, 2017 - Springer
In this paper, we propose an improved scheme to solve the security risks of S-S's scheme. In
order to resist the replay attack, the improved protocol uses the pseudo identifier XOR to …