A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing
暂无分享,去创建一个
Yong-Yuan Deng | Mao-Lun Chiang | Chin-Ling Chen | Ching-Cheng Liu | Hui-Ching Hsieh | Chin-Ling Chen | M. Chiang | Hui-Ching Hsieh | Yong-Yuan Deng | Ching-Cheng Liu
[1] GaniAbdullah,et al. The rise of "big data" on cloud computing , 2015 .
[2] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[3] Michael J. Marcus,et al. 5G and "IMT for 2020 and beyond" [Spectrum Policy and Regulatory Issues] , 2015, IEEE Wireless Communications.
[4] J. H. Chen,et al. A fresh Two-party Authentication Key Exchange Protocol for Mobile Environment , 2015 .
[5] Zhenguo Zhao,et al. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.
[6] Toktam Mahmoodi,et al. Softwarization and virtualization in 5G mobile networks: Benefits, trends and challenges , 2018, Comput. Networks.
[7] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[8] Chia-Chin Chiang,et al. Tilted Fiber Bragg Grating Sensor with Graphene Oxide Coating for Humidity Sensing , 2017, Sensors.
[9] Navrati Saxena,et al. Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.
[10] Heekuck Oh,et al. A Hybrid Approach for Efficient Privacy-Preserving Authentication in VANET , 2017, IEEE Access.
[11] Chin-Ling Chen,et al. Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System , 2017, Sensors.
[12] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[13] Dario Pompili,et al. Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.
[14] Jianliang Xu,et al. QoS-aware replica placement for content distribution , 2005, IEEE Transactions on Parallel and Distributed Systems.
[15] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[16] Jian Shen,et al. A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..
[17] Sheetal Kalra,et al. A lightweight biometrics based remote user authentication scheme for IoT services , 2017, J. Inf. Secur. Appl..
[18] Cheng-Chi Lee,et al. Design and analysis of a secure and effective emergency system for mountaineering events , 2013, The Journal of Supercomputing.
[19] Chin-Ling Chen,et al. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing , 2017, J. Sensors.
[20] Hannu Tenhunen,et al. End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..
[21] Zdenek Becvar,et al. Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.
[22] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[23] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[24] Y.T. Zhang,et al. Wearable medical devices for tele-home healthcare , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[25] Xiong Li,et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.