An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps
暂无分享,去创建一个
Athanasios V. Vasilakos | Cheng-Chi Lee | Yan-Ming Lai | Che-Wei Hsu | A. Vasilakos | Cheng-Chi Lee | Yan-Ming Lai | Che-Wei Hsu
[1] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[2] Cheng-Chi Lee,et al. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2012, Nonlinear Dynamics.
[3] Alessio Vecchio,et al. Opportunistic computing for wireless sensor networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[4] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[5] Mani Krishna,et al. SPOC : A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2012 .
[6] Azzedine Boukerche,et al. Monitoring patients via a secure and mobile healthcare system , 2010, IEEE Wireless Communications.
[7] Debiao He,et al. Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol , 2012, Nonlinear Dynamics.
[8] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Andrew T. Campbell,et al. Fast track article: Bubble-sensing: Binding sensing tasks to the physical world , 2010 .
[11] ALESSANDRA TONINELLI,et al. Enabling secure service discovery in mobile healthcare enterprise networks , 2009, IEEE Wireless Communications.
[12] Cheng-Chi Lee,et al. An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.
[13] Hung-Yu Chien,et al. ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.
[14] Cheng-Chi Lee,et al. Toward a secure batch verification with group testing for VANET , 2013, Wirel. Networks.
[15] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[16] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[17] Artak Amirbekyan,et al. A New Efficient Privacy-Preserving Scalar Product Protocol , 2007, AusDM.
[18] Xiaohui Liang,et al. A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network , 2011, Mob. Networks Appl..
[19] Song Han,et al. Chaotic map based key agreement with/out clock synchronization , 2009 .
[20] Marco Conti,et al. From opportunistic networks to opportunistic computing , 2010, IEEE Communications Magazine.
[21] Eun-Jun Yoon,et al. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .
[22] Xiaodong Lin,et al. Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.
[23] Xiaodong Lin,et al. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.
[24] Yuguang Fang,et al. Cross-Domain Data Sharing in Distributed Electronic Health Record Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.
[25] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[26] Mohan Kumar,et al. Opportunities in Opportunistic Computing , 2010, Computer.
[27] Mohan Kumar,et al. Performance evaluation of service execution in opportunistic computing , 2010, MSWIM '10.
[28] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[29] Jamil Y. Khan,et al. Wireless Body Sensor Network Using Medical Implant Band , 2007, Journal of Medical Systems.
[30] Xiaodong Lin,et al. An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[31] A. Miyaji,et al. New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .
[32] Roksana Boreli,et al. Improving the efficiency of anonymous routing for MANETs , 2012, Comput. Commun..
[33] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[34] Xiaohui Liang,et al. Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network , 2010, BODYNETS.
[35] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.