A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs
暂无分享,去创建一个
[1] Arputharaj Kannan,et al. Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[2] Chin-Chen Chang,et al. An authenticated group key distribution protocol based on the generalized Chinese remainder theorem , 2014, Int. J. Commun. Syst..
[3] Chao Yang,et al. Efficient end-to-end authentication protocol for wearable health monitoring systems , 2017, Comput. Electr. Eng..
[4] Alexander Sprintson,et al. A randomized algorithm and performance bounds for coded cooperative data exchange , 2010, 2010 IEEE International Symposium on Information Theory.
[5] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[6] Alexander Sprintson,et al. On coding for cooperative data exchange , 2010, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).
[7] Jiankun Hu,et al. Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds , 2017, IEEE Transactions on Information Forensics and Security.
[8] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[9] Yuan-Ting Zhang,et al. Heartbeats Based Biometric Random Binary Sequences Generation to Secure Wireless Body Sensor Networks , 2018, IEEE Transactions on Biomedical Engineering.
[10] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[11] Jianfeng Ma,et al. A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..
[12] Sung Bum Pan,et al. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs , 2018, Wirel. Commun. Mob. Comput..
[13] Kazue Sako,et al. k-Times Anonymous Authentication , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[14] Arputharaj Kannan,et al. Chinese remainder theorem based centralised group key management for secure multicast communication , 2014, IET Inf. Secur..
[15] Baocang Wang,et al. Group key agreement for secure group communication in dynamic peer systems , 2012, J. Parallel Distributed Comput..
[16] Sherali Zeadally,et al. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.
[17] Jian Shen,et al. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks , 2016, J. Netw. Comput. Appl..
[18] Jian Shen,et al. Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.
[19] Giancarlo Fortino,et al. Collaborative Body Sensor Networks , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.
[20] Thomas A. Courtade,et al. Coded Cooperative Data Exchange for a Secret Key , 2014, IEEE Transactions on Information Theory.
[21] Sajal K. Das,et al. ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.
[22] Yuan-Ting Zhang,et al. An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks , 2015, Sensors.
[23] Eun-Jun Yoon,et al. Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC , 2009, 2009 International Conference on Computational Science and Engineering.
[24] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[25] Im-Yeong Lee,et al. Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments , 2018, Sensors.
[26] Yang Xiang,et al. A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment , 2017, Multimedia Tools and Applications.
[27] Michael Langberg,et al. Coded Cooperative Data Exchange Problem for General Topologies , 2012, IEEE Transactions on Information Theory.
[28] Jie Zhou,et al. Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme , 2009, ICA3PP.
[29] Jian Liu,et al. against frame and collude attacks of third party auditor , 2014 .
[30] Günther Horn,et al. Authentication and Payment in Future Mobile Systems , 1998, J. Comput. Secur..
[31] Xiaochen Li,et al. Energy-Efficient Group Key Agreement for Wireless Networks , 2015, IEEE Transactions on Wireless Communications.
[32] Richard D. Wesel,et al. Weighted universal recovery, practical secrecy, and an efficient algorithm for solving both , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[33] Pin-Han Ho,et al. A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy , 2009, IEEE Transactions on Vehicular Technology.
[34] Chin-Chen Chang,et al. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2009, Comput. Secur..
[35] Jie Zhou,et al. Key tree and Chinese remainder theorem based group key distrubution scheme , 2009 .
[36] Jie Ma,et al. Channel Characteristic Aware Privacy Protection Mechanism in WBAN , 2018, Sensors.
[37] Sung Bum Pan,et al. An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection , 2018 .
[38] Hu Xiong,et al. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol , 2014, IEEE Transactions on Information Forensics and Security.
[39] Manyam Thaile,et al. Node Compromise Detection based on NodeTrust in Wireless Sensor Networks , 2016, 2016 International Conference on Computer Communication and Informatics (ICCCI).
[40] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[41] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[42] Jianhua Chen,et al. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012, Inf. Fusion.
[43] Haowen Tan,et al. Comments on “Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks” , 2018, IEEE Transactions on Intelligent Transportation Systems.
[44] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[45] Chin-Tser Huang,et al. Chinese remainder theorem based group key management , 2007, ACM-SE 45.
[46] Weidong Kou,et al. Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks , 2009, IEEE Transactions on Vehicular Technology.
[47] Richard D. Wesel,et al. Coded Cooperative Data Exchange in Multihop Networks , 2012, IEEE Transactions on Information Theory.
[48] Alexander Sprintson,et al. Cooperative data exchange with priority classes , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[49] Huaqun Wang,et al. Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.
[50] Kannan Ramchandran,et al. Deterministic algorithm for the cooperative data exchange problem , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[51] Hu Jin,et al. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012 .
[52] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.