Efficient and privacy-preserving authentication scheme for wireless body area networks
暂无分享,去创建一个
Bin Liu | Mengxia Shuai | Ling Xiong | Changhui Wang | Nenghai Yu | B. Liu | Nenghai Yu | Ling Xiong | Mengxia Shuai | Changhui Wang
[1] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[2] Chunhua Jin,et al. An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks , 2018, Journal of Medical Systems.
[3] Jian Shen,et al. A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..
[4] Zhenguo Zhao,et al. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.
[5] Xiong Li,et al. An enhanced 1-round authentication protocol for wireless body area networks with user anonymity , 2017, Comput. Electr. Eng..
[6] Yanmei Zhang,et al. New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing , 2015, Journal of Medical Systems.
[7] Jenq-Shiou Leu,et al. Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks , 2014, Wirel. Commun. Mob. Comput..
[8] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Ashok Kumar Das,et al. A novel and efficient user access control scheme for wireless body area sensor networks , 2014, J. King Saud Univ. Comput. Inf. Sci..
[11] Daiyuan Peng,et al. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks , 2017, Sensors.
[12] Bin Liu,et al. MAC protocol in wireless body area networks for E-health: challenges and a context-aware design , 2013, IEEE Wireless Communications.
[13] Ashok Kumar Das,et al. A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks , 2015, Ad Hoc Sens. Wirel. Networks.
[14] Fagen Li,et al. A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures , 2019, IEEE Access.
[15] Ping Wang,et al. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.
[16] Ping Wang,et al. Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks , 2018, IEEE Transactions on Industrial Informatics.
[17] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[18] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[19] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[20] Joseph H. Silverman,et al. Elliptic Curves and Cryptography , 2014 .
[21] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[22] Athanasios V. Vasilakos,et al. Authenticated key management protocol for cloud-assisted body area sensor networks , 2018, J. Netw. Comput. Appl..
[23] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[24] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[25] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[26] Yong Li,et al. A time synchronization mechanism for heterogeneous wireless sensor networks , 2012 .
[27] Elisa Bertino,et al. Robust Multi-Factor Authentication for Fragile Communications , 2014, IEEE Transactions on Dependable and Secure Computing.
[28] Debiao He,et al. Robust Biometrics-Based Authentication Scheme for Multiserver Environment , 2015, IEEE Systems Journal.
[29] Xiaotie Deng,et al. TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[30] Rong Sun,et al. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks , 2016, Sensors.
[31] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[32] Jian Shen,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..
[33] Libing Wu,et al. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks , 2016, Journal of Medical Systems.
[34] Maged Hamada Ibrahim,et al. Secure anonymous mutual authentication for star two-tier wireless body area networks , 2016, Comput. Methods Programs Biomed..
[35] Thomas G. Zimmerman,et al. : Near-field , 2022 .
[36] Nenghai Yu,et al. Anonymous authentication scheme for smart home environment with provable security , 2019, Comput. Secur..
[37] Dezhong Peng,et al. Analysis and Improvement of a Mutual Authentication Scheme for Wireless Body Area Networks , 2019, Journal of Medical Systems.