The yoking-proof-based authentication protocol for cloud-assisted wearable devices

[1]  M. U. Shaikh,et al.  IoT-enabled Web warehouse architecture: a secure approach , 2015, Personal and Ubiquitous Computing.

[2]  Hong Liu,et al.  YPAP: The Yoking-Proofs Based Authentication Protocol for Wearable Devices in Wireless Communications , 2015, 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom).

[3]  Xiaolei Dong,et al.  PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems , 2015, IEEE Journal of Selected Topics in Signal Processing.

[4]  Yi-Bing Lin,et al.  EasyConnect: A Management System for IoT Devices and Its Applications for Interactive Design and Art , 2015, IEEE Internet of Things Journal.

[5]  Xiaolei Dong,et al.  Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions , 2015, IEEE Wireless Communications.

[6]  Ragib Hasan,et al.  SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[7]  Seung Eun Lee,et al.  Secure communication system for wearable devices wireless intra body communication , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).

[8]  Mike Bailey,et al.  The Wearable Revolution , 2015, IEEE Computer Graphics and Applications.

[9]  Sherali Zeadally,et al.  Toward self-authenticable wearable devices , 2015, IEEE Wireless Communications.

[10]  Min Chen,et al.  AIWAC: affective interaction through wearable computing and cloud technology , 2015, IEEE Wireless Communications.

[11]  Mohsen Guizani,et al.  User privacy and data trustworthiness in mobile crowd sensing , 2015, IEEE Wireless Communications.

[12]  Laurence T. Yang,et al.  Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things , 2015, IEEE Transactions on Parallel and Distributed Systems.

[13]  Chris Greenhalgh,et al.  Social Access vs. Privacy in Wearable Computing: A Case Study of Autism , 2015, IEEE Pervasive Computing.

[14]  Oscar Mayora-Ibarra,et al.  Mobile phones as medical devices in mental disorder treatment: an overview , 2014, Personal and Ubiquitous Computing.

[15]  Xiuzhen Cheng,et al.  Advances on data, information, and knowledge in the internet of things , 2014, Personal and Ubiquitous Computing.

[16]  José Daniel García Sánchez,et al.  The Internet of Things: connecting the world , 2014, Personal and Ubiquitous Computing.

[17]  Niraj K. Jha,et al.  Improving the Trustworthiness of Medical Device Software with Formal Verification Methods , 2013, IEEE Embedded Systems Letters.

[18]  Laurence T. Yang,et al.  Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[19]  Meng Zhang,et al.  MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection , 2013, IEEE Transactions on Biomedical Circuits and Systems.

[20]  Hung-Yu Chien,et al.  Tree-Based RFID Yoking Proof , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[21]  Sang-Soo Yeo,et al.  Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[22]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[23]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[24]  Peter Honeyman,et al.  Nonmonotonic cryptographic protocols , 1994, Proceedings The Computer Security Foundations Workshop VII.

[25]  Laurence T. Yang,et al.  Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.

[26]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.