EBIAC: Efficient biometric identity-based access control for wireless body area networks
暂无分享,去创建一个
Jinsong Shan | Chunhua Jin | Yongliang Xu | Ying Jin | Guanhua Chen | Changhui Yu | Chunhua Jin | Ying Jin | Jinsong Shan | Guanhua Chen | Yongliang Xu | Changhui Yu
[1] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[2] Fagen Li,et al. A biometric identity-based signcryption scheme , 2012, Future Gener. Comput. Syst..
[3] Fagen Li,et al. A combined public-key scheme in the case of attribute-based for wireless body area networks , 2019, Wirel. Networks.
[4] Fagen Li,et al. An efficient and practical certificateless signcryption scheme for wireless body area networks , 2020, Comput. Commun..
[5] Jing Liu,et al. Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks , 2015, ICA3PP.
[6] Yupu Hu,et al. An Efficient Biometric Identity Based Signature Scheme , 2013, KSII Trans. Internet Inf. Syst..
[7] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[8] Lin You,et al. Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings , 2021, IEEE Access.
[9] R. Venkateswari,et al. Security Challenges and Solutions for Wireless Body Area Networks , 2018, Advances in Intelligent Systems and Computing.
[10] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[11] Kyung-Ah Shim,et al. EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.
[12] Joonsang Baek,et al. Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment , 2018, Advances in Cyber Security.
[13] Donghoon Chang,et al. Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message , 2015, ACISP.
[14] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[15] Keita Emura,et al. A KEM/DEM-Based Construction for Secure and Anonymous Communication , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[16] Changji Wang. A provable secure fuzzy identity based signature scheme , 2011, Science China Information Sciences.
[17] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[18] Victor Shoup,et al. OAEP Reconsidered , 2001, CRYPTO.
[19] Adam Duffy,et al. A Biometric Identity Based Signature Scheme , 2007, Int. J. Netw. Secur..
[20] Eike Kiltz,et al. Hybrid Encryption in a Multi-user Setting, Revisited , 2018, Public Key Cryptography.
[21] Bin Liu,et al. Efficient and privacy-preserving authentication scheme for wireless body area networks , 2020, J. Inf. Secur. Appl..
[22] Ted Taekyoung Kwon,et al. Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM , 2015, WISA.
[23] Hizbullah Khattak,et al. An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things , 2019, Electronics.
[24] Peilin Hong,et al. Distributed access control with adaptive privacy preserving property for wireless sensor networks , 2014, Secur. Commun. Networks.
[25] Yupu Hu,et al. Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe , 2019, J. Inf. Secur. Appl..
[26] Abdelfettah Belghith,et al. Wireless Body Area Networks: Applications and Technologies , 2016, ANT/SEIT.
[27] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[28] Puwen Wei,et al. Identity-based Broadcast Encryption with Efficient Revocation , 2019, IACR Cryptol. ePrint Arch..
[29] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[30] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[31] Zhoujun Li,et al. A novel fuzzy identity based signature scheme based on the short integer solution problem , 2014, Comput. Electr. Eng..
[32] Chunhua Jin,et al. Cost-Effective and Anonymous Access Control for Wireless Body Area Networks , 2018, IEEE Systems Journal.
[33] Xiaolei Dong,et al. Fuzzy identity based signature with applications to biometric authentication , 2011, Comput. Electr. Eng..
[34] Chunhua Jin,et al. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network , 2018, Journal of Medical Systems.
[35] Kyung-Ah Shim,et al. S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks , 2014, Ad Hoc Networks.
[36] Peyman Dodangeh,et al. A biometric security scheme for wireless body area networks , 2018, J. Inf. Secur. Appl..
[37] Sherali Zeadally,et al. Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN) , 2021, Microprocess. Microsystems.
[38] Xianhui Lu,et al. Identity-based encryption with non-interactive opening , 2008 .
[39] Kaoru Kurosawa,et al. Tag-KEM/DEM: A New Framework for Hybrid Encryption , 2008, Journal of Cryptology.
[40] Gary M. Weiss,et al. Biometric Authentication and Verification for Medical Cyber Physical Systems , 2018, Electronics.
[41] Yohei Watanabe,et al. CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance , 2017, Int. J. Appl. Cryptogr..
[42] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[43] Kim-Kwang Raymond Choo,et al. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems , 2019, IEEE Transactions on Dependable and Secure Computing.
[44] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[45] Qiaoyan Wen,et al. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing , 2016, IEEE Transactions on Parallel and Distributed Systems.
[46] R. Nidhya,et al. Security and Privacy Issues in Remote Healthcare Systems Using Wireless Body Area Networks , 2019 .
[47] Fagen Li,et al. Efficient Certificateless Access Control for Wireless Body Area Networks , 2016, IEEE Sensors Journal.
[48] Daojing He,et al. A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.
[49] Yiliang Han,et al. Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data , 2017, Inscrypt.