A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
暂无分享,去创建一个
Jianfeng Ma | Meixia Miao | Limin Shen | Ximeng Liu | Fushan Wei | Ximeng Liu | Fushan Wei | Jianfeng Ma | Meixia Miao | Limin Shen
[1] Kefei Chen,et al. An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc Networks , 2007 .
[2] Xiaodong Lin,et al. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.
[3] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[4] Lei Zhang,et al. Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.
[5] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[6] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[7] Robert H. Deng,et al. An Efficient Privacy-Preserving Outsourced Computation over Public Data , 2017, IEEE Transactions on Services Computing.
[8] Xuemin Shen,et al. A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[9] C. L. Philip Chen,et al. Data-intensive applications, challenges, techniques and technologies: A survey on Big Data , 2014, Inf. Sci..
[10] Robert H. Deng,et al. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.
[11] Xiaodong Lin,et al. Fine-grained data sharing in cloud computing for mobile devices , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[12] C. Pandu Rangan,et al. Identity based partial aggregate signature scheme without pairing , 2012, 2012 35th IEEE Sarnoff Symposium.
[13] Limin Shen,et al. Notes on the security of certificateless aggregate signature schemes , 2014, Inf. Sci..
[14] Nuno Pereira,et al. Efficient Aggregate Computations in Large-Scale Dense WSN , 2009, 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium.
[15] Matthew Green,et al. Synchronized aggregate signatures: new definitions, constructions and applications , 2010, CCS '10.
[16] Didier Dubois,et al. Suitable Properties for Any Electronic Voting System , 2006, Artificial Intelligence and Law.
[17] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[18] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[19] Dengguo Feng,et al. ID-Based Aggregate Signatures from Bilinear Pairings , 2005, CANS.
[20] Hongwei Li,et al. Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.
[21] Kefei Chen,et al. Two Certificateless Aggregate Signatures From Bilinear Maps , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[22] Jianfeng Ma,et al. Efficient attribute based sequential aggregate signature for wireless sensor networks , 2014, Int. J. Sens. Networks.
[23] Xiaohui Liang,et al. EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid , 2014, IEEE Transactions on Parallel and Distributed Systems.
[24] E. Hargittai. Is Bigger Always Better? Potential Biases of Big Data Derived from Social Network Sites , 2015 .
[25] Ryu Miura,et al. Toward Energy Efficient Big Data Gathering in Densely Distributed Sensor Networks , 2014, IEEE Transactions on Emerging Topics in Computing.
[26] Incheon Paik,et al. Big Data Infrastructure for Active Situation Awareness on Social Network Services , 2013, 2013 IEEE International Congress on Big Data.
[27] Xian Wang,et al. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks , 2015, Inf. Sci..
[28] Qiaoyan Wen,et al. On the security of a certificateless aggregate signature scheme , 2013, IACR Cryptol. ePrint Arch..
[29] Deborah Estrin,et al. A wireless sensor network For structural monitoring , 2004, SenSys '04.
[30] Ma,et al. An Aggregate Signature Scheme with Specified Verifier , 2011 .
[31] Zhi Guan,et al. An efficient certificateless aggregate signature with constant pairing computations , 2013, Inf. Sci..
[32] Javier Herranz,et al. Deterministic Identity-Based Signatures for Partial Aggregation , 2006, Comput. J..
[33] Zuhua Shao,et al. Enhanced Aggregate Signatures from Pairings , 2005, CISC.
[34] Hovav Shacham,et al. Sequential Aggregate Signatures from Trapdoor Permutations , 2004, EUROCRYPT.
[35] Xiaojun Cao,et al. Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects , 2014, IEEE Internet of Things Journal.
[36] Craig Gentry,et al. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing , 2007, CCS '07.
[37] Charles Lynn,et al. Secure Border Gateway Protocol (Secure-BGP) , 2000 .
[38] Xiaolei Dong,et al. Identity based signature scheme based on cubic residues , 2011, Science China Information Sciences.
[39] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[40] Wakaha Ogata,et al. Certificateless Aggregate Signature Schemes with Improved Security , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[41] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[42] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[43] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[44] Renan C. A. Alves,et al. Assisting Physical (Hydro)Therapy With Wireless Sensors Networks , 2015, IEEE Internet of Things Journal.
[45] B. Mukherjee,et al. Analysis of a prediction-based mobility adaptive tracking algorithm , 2005, 2nd International Conference on Broadband Networks, 2005..
[46] Craig Gentry,et al. Identity-Based Aggregate Signatures , 2006, Public Key Cryptography.
[47] Xiaodong Lin,et al. Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.
[48] Xuemin Shen,et al. An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.
[49] Yi Yang,et al. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[50] Jin Li,et al. Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature , 2007, ProvSec.
[51] Jianhua Chen,et al. Insecurity of an efficient certificateless aggregate signature with constant pairing computations , 2014, Inf. Sci..