A Novel User Authentication and Key Management Protocol for Cloud Assisted Body Area Network
暂无分享,去创建一个
[1] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[2] Qiang Liu,et al. A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing , 2017, 2017 International Conference on Networking and Network Applications (NaNA).
[3] Melissa Chase,et al. FAME: Fast Attribute-based Message Encryption , 2017, CCS.
[4] Yan Zhang,et al. An identity authentication scheme based on cloud computing environment , 2017, Multimedia Tools and Applications.
[5] Brent Waters,et al. Constructing Verifiable Random Functions with Large Input Spaces , 2010, EUROCRYPT.
[6] Peter J. Tonellato,et al. Cloud computing for comparative genomics , 2010, BMC Bioinformatics.
[7] Jianfeng Ma,et al. A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.
[8] Peter J. Tonellato,et al. Cost-Effective Cloud Computing: A Case Study Using the Comparative Genomics Tool, Roundup , 2010, Evolutionary bioinformatics online.
[9] Nigel P. Smart,et al. Lattice Attacks on Digital Signature Schemes , 2001, Des. Codes Cryptogr..
[10] Min Chen,et al. NDNC-BAN: Supporting rich media healthcare services via named data networking in cloud-assisted wireless body area networks , 2014, Inf. Sci..
[11] Jian Shen,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..
[12] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[13] Yan-yan Wang,et al. A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..
[14] Jen-Ho Yang,et al. An ID-Based User Authentication Scheme for Cloud Computing , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[15] Michael C. Schatz,et al. Cloud Computing and the DNA Data Race , 2010, Nature Biotechnology.
[16] Athanasios V. Vasilakos,et al. Authenticated key management protocol for cloud-assisted body area sensor networks , 2018, J. Netw. Comput. Appl..
[17] Athanasios V. Vasilakos,et al. Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems , 2020, Future Gener. Comput. Syst..
[18] Jia-Lun Tsai,et al. A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2015, IEEE Systems Journal.
[19] Athanasios V. Vasilakos,et al. Cloud-assisted body area networks: state-of-the-art and future challenges , 2014, Wirel. Networks.
[20] Vanga Odelu,et al. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.
[21] Wei-Kuan Shih,et al. An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing , 2011, 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering.
[22] Xuejie Zhang,et al. Identity-Based Authentication in Cloud Storage Sharing , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[23] Behnam Bahrak,et al. An improved authentication protocol for distributed mobile cloud computing services , 2017, Int. J. Crit. Infrastructure Prot..
[24] Ashok Kumar Das,et al. A new two-server authentication and key agreement protocol for accessing secure cloud services , 2018, Comput. Networks.
[25] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[26] M. S. Avila-Garcia,et al. Lowering the Barriers to Cancer Imaging , 2008, 2008 IEEE Fourth International Conference on eScience.
[27] Jin-Mook Kim,et al. Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments , 2014, Int. J. Distributed Sens. Networks.
[28] Silvio Micali,et al. Verifiable random functions , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).