Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT
暂无分享,去创建一个
Wei Wu | Xinyi Huang | Yang Xiang | Jian Yang | Jianghua Liu
[1] Wanlei Zhou,et al. Authenticated Medical Documents Releasing with Privacy Protection and Release Control , 2021, IEEE Transactions on Dependable and Secure Computing.
[2] Jingyu Hou,et al. Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control , 2020, IEEE Transactions on Computers.
[3] Im-Yeong Lee,et al. A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments , 2020, Sensors.
[4] Tianqing Zhu,et al. Secure and efficient sharing of authenticated energy usage data with privacy preservation , 2020, Comput. Secur..
[5] Olivier Sanders,et al. Improving Revocation for Group Signature with Redactable Signature , 2020, IACR Cryptol. ePrint Arch..
[6] Olivier Sanders,et al. Efficient Redactable Signature and Application to Anonymous Credentials , 2020, IACR Cryptol. ePrint Arch..
[7] P. Vasudeva Reddy,et al. Efficient and Secure Pairing-Free Certificateless Aggregate Signature Scheme for Healthcare Wireless Medical Sensor Networks , 2019, IEEE Internet of Things Journal.
[8] Debiao He,et al. New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment , 2018, Secur. Commun. Networks.
[9] Sherali Zeadally,et al. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.
[10] Arun Kumar Sangaiah,et al. A certificateless aggregate signature scheme for healthcare wireless sensor network , 2017, Sustain. Comput. Informatics Syst..
[11] Wanlei Zhou,et al. Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases , 2018, ESORICS.
[12] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[13] Henrich Christopher Pöhls,et al. Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures , 2017, ARES.
[14] Li Xu,et al. Protecting Mobile Health Records in Cloud Computing , 2017, ACM Trans. Embed. Comput. Syst..
[15] David Pointcheval,et al. Short Randomizable Signatures , 2016, CT-RSA.
[16] Daniel Slamanig,et al. A General Framework for Redactable Signatures and New Constructions , 2015, ICISC.
[17] Joseph K. Liu,et al. Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..
[18] Henrich Christopher Pöhls,et al. Accountable Redactable Signatures , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[19] Liming Zhou,et al. Cryptanalysis and improvement of a certificateless aggregate signature scheme , 2015, Inf. Sci..
[20] Henrich Christopher Pöhls,et al. On Updatable Redactable Signatures , 2014, ACNS.
[21] Jianhua Chen,et al. Insecurity of an efficient certificateless aggregate signature with constant pairing computations , 2014, Inf. Sci..
[22] He Liu,et al. New Construction of Efficient Certificateless Aggregate Signatures , 2014 .
[23] Joachim Posegga,et al. Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions , 2012, ICETE.
[24] Eunjeong Lee,et al. A short redactable signature scheme using pairing , 2012, Secur. Commun. Networks.
[25] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[26] Stefan Katzenbeisser,et al. Redactable Signatures for Tree-Structured Data: Definitions and Constructions , 2010, ACNS.
[27] Youki Kadobayashi,et al. A Storage Efficient Redactable Signature in the Standard Model , 2009, ISC.
[28] Jia Xu,et al. Short Redactable Signatures Using Random Trees , 2009, CT-RSA.
[29] Yi Mu,et al. Certificateless Signature Revisited , 2007, ACISP.
[30] Kefei Chen,et al. Two Certificateless Aggregate Signatures From Bilinear Maps , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[31] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[32] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[33] Hideki Imai,et al. Digitally signed document sanitizing scheme based on bilinear maps , 2006, ASIACCS '06.
[34] Hideki Imai,et al. Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[35] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[36] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[37] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[38] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[39] Ron Steinfeld,et al. Content Extraction Signatures , 2001, ICISC.
[40] A. Beimel. Secure schemes for secret sharing and key distribution , 1996 .
[41] Adi Shamir,et al. How to share a secret , 1979, CACM.