Confidentiality-Preserving Personal Health Records in Tele-Healthcare System Using Authenticated Certificateless Encryption
暂无分享,去创建一个
[1] Ben Lynn,et al. Authenticated Identity-Based Encryption , 2002, IACR Cryptol. ePrint Arch..
[2] K.K. Venkatasubramanian,et al. Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[3] Qiaoyan Wen,et al. An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems , 2013, Journal of Medical Systems.
[4] Jongho Moon,et al. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps , 2015, Journal of Medical Systems.
[5] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[6] A. Miyaji,et al. New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .
[7] Manuel Barbosa,et al. Certificateless signcryption , 2008, ASIACCS '08.
[8] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[9] L M Nichols,et al. The Health Insurance Portability and Accountability Act of 1996: summary of provisions and anticipated effects. , 1998, The Journal of medical practice management : MPM.
[10] Wenfen Liu,et al. An Improved Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[11] Sang-Jae Moon,et al. How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes , 2005, ICISS.
[12] C. Pandu Rangan,et al. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing , 2009, Inscrypt.
[13] Robert H. Deng,et al. Cryptanalysis of a certificateless signcryption scheme in the standard model , 2011, Inf. Sci..
[14] Rui Zhang,et al. A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[15] Yupu Hu,et al. Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..
[16] Zhian Zhu,et al. An Efficient Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[17] Addepalli V. N. Krishna,et al. Window Method Based Cubic Spline Curve Public Key Cryptography , 2016 .
[18] C. Pandu Rangan,et al. Security Weaknesses in Two Certificateless Signcryption Schemes , 2010, IACR Cryptol. ePrint Arch..
[19] Emil Jovanov,et al. Guest Editorial Introduction to the Special Section on M-Health: Beyond Seamless Mobility and Global Wireless Health-Care Connectivity , 2004, IEEE Transactions on Information Technology in Biomedicine.
[20] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[21] Richard Comley,et al. Efficient Certificateless Public Key Encryption , 2005, IACR Cryptol. ePrint Arch..
[22] Zhixiong Chen,et al. A New Efficient Certificateless Signcryption Scheme , 2008, 2008 International Symposium on Information Science and Engineering.
[23] Yu-Fang Chung,et al. A Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[24] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[25] Min-Shiang Hwang,et al. A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms , 2017, Int. J. Netw. Secur..
[26] Hui-Feng Huang,et al. Convertible Multi-authenticated Encryption Scheme for Data Communication , 2015, Int. J. Netw. Secur..