Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain
暂无分享,去创建一个
Ashok Kumar Das | Youngho Park | Sungjin Yu | Joonyoung Lee | Myeonghyun Kim | Seunghwan Son | A. Das | Youngho Park | Joonyoung Lee | Myeonghyun Kim | Sungjin Yu | Seunghwan Son
[1] Muhammad Khurram Khan,et al. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System , 2017, Journal of Medical Systems.
[2] YoHan Park,et al. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks , 2016, Sensors.
[3] Joel J. P. C. Rodrigues,et al. TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment , 2019, IEEE Transactions on Vehicular Technology.
[4] Samiran Chattopadhyay,et al. A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment , 2019, IEEE Internet of Things Journal.
[5] Tugrul Yanik,et al. A Survey of SIP Authentication and Key Agreement Schemes , 2014, IEEE Communications Surveys & Tutorials.
[6] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[7] Zhenguo Zhao,et al. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.
[8] YoungHo Park,et al. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications , 2018, Sensors.
[9] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[10] Chao Yang,et al. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth , 2016, Journal of Medical Systems.
[11] Atif Alamri,et al. Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment , 2019, IEEE Access.
[12] Samiran Chattopadhyay,et al. Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications , 2019, IEEE Transactions on Industrial Informatics.
[13] Ashok Kumar Das,et al. On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks , 2020, IEEE Access.
[14] Aiqing Zhang,et al. Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain , 2018, Journal of Medical Systems.
[15] Ashok Kumar Das,et al. Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks , 2017, IEEE Access.
[16] Sherali Zeadally,et al. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.
[17] Sebastian Mödersheim,et al. OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.
[18] Zibin Zheng,et al. Blockchain for cloud exchange: A survey , 2020, Comput. Electr. Eng..
[19] YoHan Park,et al. Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment , 2020, Applied Sciences.
[20] Hao Wang,et al. Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain , 2018, Journal of Medical Systems.
[21] David von Oheimb. The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .
[22] Young-Ho Park,et al. A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks , 2020, Applied Sciences.
[23] Samiran Chattopadhyay,et al. On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems , 2017, IEEE Access.
[24] Eun-Jun Yoon,et al. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.
[25] YoHan Park,et al. Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments , 2019, Sensors.
[26] Mauro Conti,et al. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.
[27] Ting Li,et al. Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology , 2020, IEEE Access.
[28] Chin-Ling Chen,et al. A Privacy Authentication Scheme Based on Cloud for Medical Environment , 2014, Journal of Medical Systems.
[29] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[30] Sheetal Kalra,et al. A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services , 2018, Iranian Journal of Science and Technology, Transactions of Electrical Engineering.
[31] Rui Guo,et al. Flexible and Efficient Blockchain-Based ABE Scheme With Multi-Authority for Medical on Demand in Telemedicine System , 2019, IEEE Access.
[32] YoHan Park,et al. Secure user authentication scheme with novel server mutual verification for multiserver environments , 2019, Int. J. Commun. Syst..
[33] Roberto Baldoni,et al. PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.
[34] Chunhua Jin,et al. An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks , 2018, Journal of Medical Systems.
[35] Chun-Ta Li,et al. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. , 2018, Computer methods and programs in biomedicine.
[36] Ashok Kumar Das,et al. Certificate-Based Anonymous Device Access Control Scheme for IoT Environment , 2019, IEEE Internet of Things Journal.
[37] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[38] Willy Susilo,et al. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.
[39] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[40] Junqiang Liu,et al. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment , 2016, Journal of Medical Systems.
[41] Mathieu Turuani,et al. The CL-Atse Protocol Analyser , 2006, RTA.
[42] Abbas Jamalipour,et al. Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[43] Ashok Kumar Das,et al. An Enhanced Access Control Scheme in Wireless Sensor Networks , 2014, Ad Hoc Sens. Wirel. Networks.
[44] Chin-Chen Chang,et al. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[45] Yong Wang,et al. Cloud-Assisted EHR Sharing With Security and Privacy Preservation via Consortium Blockchain , 2019, IEEE Access.
[46] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[47] Dezhong Peng,et al. Analysis and Improvement of a Mutual Authentication Scheme for Wireless Body Area Networks , 2019, Journal of Medical Systems.
[48] Rui Guo,et al. Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.
[49] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[50] Athanasios V. Vasilakos,et al. Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment , 2018, IEEE Internet of Things Journal.
[51] Yanmei Zhang,et al. New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing , 2015, Journal of Medical Systems.
[52] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[53] Haleh Amintoosi,et al. Cryptanalysis of Khatoon et al.'s ECC-based Authentication Protocol for Healthcare Systems , 2019, ArXiv.
[54] YoungHo Park,et al. Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain , 2020, Sensors.
[55] Athanasios V. Vasilakos,et al. Design of secure key management and user authentication scheme for fog computing services , 2019, Future Gener. Comput. Syst..
[56] Chen Li,et al. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT , 2019, IEEE Access.
[57] Ikram Ali,et al. Certificateless authenticated key agreement for blockchain-based WBANs , 2020, J. Syst. Archit..