Securing communication by attribute-based authentication in HetNet used for medical applications
暂无分享,去创建一个
Abhishek Kumar | Sachin Kumar Gupta | Achintya Singhal | Aabid Rashid | Ashutosh Srivastava | Duggirala Srinivasa Rao | Mohd Najim | Lokendra Singh Umrao | Tufail A. Lone | Sumeet Gupta | Tufail A. Lone | Ashutosh Srivastava | A. Singhal | S. Gupta | Abhishek Kumar | D. Rao | Sumeet Gupta | Aabid Rashid | Mohd Najim | L. S. Umrao
[1] Yen-Cheng Chen,et al. ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.
[2] Kai-Kit Wong,et al. Robust Physical Layer Security for Power Domain Non-Orthogonal Multiple Access-Based HetNets and HUDNs: SIC Avoidance at Eavesdroppers , 2019, IEEE Access.
[3] Hilde van der Togt,et al. Publisher's Note , 2003, J. Netw. Comput. Appl..
[4] Ryoichi Komiya,et al. A Study of Attribute-Based Encryption for Body Sensor Networks , 2011 .
[5] Ling Luo,et al. Caching-Aided Physical Layer Security in Wireless Cache-Enabled Heterogeneous Networks , 2018, IEEE Access.
[6] Abdul Hanan Abdullah,et al. F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs , 2017, J. King Saud Univ. Comput. Inf. Sci..
[7] Omprakash Kaiwartya,et al. Physical Layer Security in Vehicular Networks with Reconfigurable Intelligent Surfaces , 2019, 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring).
[8] Omprakash Kaiwartya,et al. Physical Layer Security in Vehicular Communication Networks in the Presence of Interference , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[9] Eduard A. Jorswieck,et al. Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel? , 2013, 2013 IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[10] Youngho Park,et al. A secure billing protocol over attribute-based encryption in vehicular cloud computing , 2016, EURASIP J. Wirel. Commun. Netw..
[11] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[12] You-Chiun Wang,et al. Small-cell planning in LTE HetNet to improve energy efficiency , 2018, Int. J. Commun. Syst..
[13] Rose Qingyang Hu,et al. Interference Management for Physical Layer Security in Heterogeneous Networks , 2017, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[14] Jiguo Li,et al. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation , 2014, International Journal of Information Security.
[15] Nouha Oualha,et al. Lightweight Attribute-Based Encryption for the Internet of Things , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[16] Md. Atiqur Rahman Ahad,et al. Security Analysis and a Potential Layer to Layer Security Solution of Medical Cyber-Physical Systems , 2019, A Handbook of Internet of Things in Biomedical and Cyber Physical System.
[17] Kai-Kit Wong,et al. Secrecy Energy Efficiency in Wireless Powered Heterogeneous Networks: A Distributed ADMM Approach , 2018, IEEE Access.
[18] Amang Sudarsono,et al. A secure data sharing using identity-based encryption scheme for e-healthcare system , 2017, 2017 3rd International Conference on Science in Information Technology (ICSITech).
[19] Abderrahim Beni Hssane,et al. Big healthcare data: preserving security and privacy , 2018, Journal of Big Data.
[20] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[21] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[22] Hooman Kashanian,et al. Internet of things in medical applications with a service-oriented and security approach: a survey , 2018 .
[23] Faissal El Bouanani,et al. A secure cooperative transmission model in VANET using attribute based encryption , 2016, 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS).
[24] Kwok Hung Li,et al. Physical Layer Security in Heterogeneous Networks With Pilot Attack: A Stochastic Geometry Approach , 2018, IEEE Transactions on Communications.
[25] Jie Xu,et al. Multiuser MISO Beamforming for Simultaneous Wireless Information and Power Transfer , 2013, IEEE Transactions on Signal Processing.
[26] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[27] Xianbin Wang,et al. Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.
[28] Abdul Hanan Abdullah,et al. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET , 2016, PloS one.
[29] Sheng Zhong,et al. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.
[30] Kai-Kit Wong,et al. Safeguarding massive MIMO aided hetnets using physical layer security , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[31] Kuang Jingming,et al. Resource allocation for physical layer security in heterogeneous network with hidden eavesdropper , 2016, China Communications.
[32] Xianbin Wang,et al. Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer , 2016, 2016 IEEE International Conference on Communications (ICC).
[33] Jin Cao,et al. CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets , 2019, IEEE Transactions on Dependable and Secure Computing.
[34] Omprakash Kaiwartya,et al. A reliable energy-efficient pressure-based routing protocol for underwater wireless sensor network , 2017, Wireless Networks.
[35] Abdul Hanan Abdullah,et al. A Dynamic Congestion Control Scheme for safety applications in vehicular ad hoc networks , 2018, Comput. Electr. Eng..