An Online/Offline HIBS Scheme for Privacy Protection of People-centric Sensing
暂无分享,去创建一个
[1] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[2] Mirco Musolesi,et al. The Rise of People-Centric Sensing , 2008, IEEE Internet Comput..
[3] Joonsang Baek,et al. Online/Offline Identity-Based Signcryption Revisited , 2010, Inscrypt.
[4] Allison Bishop,et al. Dual Form Signatures: An Approach for Proving Security from Static Assumptions , 2012, IACR Cryptol. ePrint Arch..
[5] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[6] Siu-Ming Yiu,et al. Secure Hierarchical Identity Based Signature and Its Application , 2004, ICICS.
[7] Ben Y. Zhao,et al. Preserving privacy in location-based mobile social applications , 2010, HotMobile '10.
[8] Joonsang Baek,et al. Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.
[9] Bo Liu,et al. An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks , 2013, CD-ARES Workshops.
[10] Yu Tang,et al. GPGC: a Grid-enabled parallel algorithm of geometric correction for remote-sensing applications: Research Articles , 2006 .
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] Jayaprakash Kar,et al. Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network , 2014, Int. J. Netw. Secur..
[13] Wang Cai-fen. ID-based on-line/off-line threshold signature scheme without bilinear pairing , 2013 .
[14] Xuejun Yang,et al. GPGC: a Grid‐enabled parallel algorithm of geometric correction for remote‐sensing applications , 2006, Concurr. Comput. Pract. Exp..
[15] Antoine Joux,et al. Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups , 2003, Journal of Cryptology.
[16] Silvio Micali,et al. On-line/off-line digital signatures , 1996, Journal of Cryptology.
[17] David Kotz,et al. People-Centric Urban Sensing: Security Challenges for the New Paradigm , 2007 .
[18] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[19] Guilin Wang,et al. An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.