Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
暂无分享,去创建一个
Jian Shen | Sai Ji | Haowen Tan | Jun Shen | Yi Tang | Ziyuan Gui | Jian Shen | S. Ji | Haowen Tan | Jun Shen | Ziyuan Gui | Yifang Tang
[1] Abbas Jamalipour,et al. Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[2] Sakshi Kaushal,et al. Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.
[3] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[4] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[5] Ricardo Dahab,et al. Two Notes on the Security of Certificateless Signatures , 2007, ProvSec.
[6] Yong Yu,et al. Cloud computing security and privacy: Standards and regulations , 2017, Comput. Stand. Interfaces.
[7] Sherali Zeadally,et al. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.
[8] Jian Shen,et al. An Efficient RFID Authentication Protocol Providing Strong Privacy and Security , 2016 .
[9] Jian Shen,et al. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.
[10] Emil C. Lupu,et al. Securing body sensor networks: Sensor association and key management , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[11] Kyung Sup Kwak,et al. Hybrid security mechanisms for wireless body area networks , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).
[12] Min-Shiang Hwang,et al. A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[13] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[14] Wang Yu-min. Certificateless Authentication Protocol Without Pairing , 2010 .
[15] Fatos Xhafa,et al. Secure deduplication storage systems supporting keyword search , 2015, J. Comput. Syst. Sci..
[16] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[17] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[18] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[19] Xiaofei Wang,et al. Cloud-enabled wireless body area networks for pervasive healthcare , 2013, IEEE Network.
[20] Lu Zhang,et al. An Efficient and Lightweight Certificateless Authentication Protocol for Wireless Body Area Networks , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[21] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[22] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[23] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[24] Hu Xiong,et al. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol , 2014, IEEE Transactions on Information Forensics and Security.
[25] Jianhong Zhang,et al. An efficient RSA-based certificateless signature scheme , 2012, J. Syst. Softw..
[26] Jin Li,et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..
[27] Qiaoyan Wen,et al. Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.
[28] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[29] Mansi Gupta,et al. A survey on wireless body area network: Security technology and its design methodology issue , 2015, 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
[30] Jian Shen,et al. A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..
[31] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[32] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[33] Jin Li,et al. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.
[34] Jian Shen,et al. A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..