An Efficient Remote Authentication Scheme for Wireless Body Area Network
暂无分享,去创建一个
[1] Hu Xiong,et al. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol , 2014, IEEE Transactions on Information Forensics and Security.
[2] P.E. Abi-Char,et al. A Fast and Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications , 2007, The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007).
[3] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[4] Muhammad Khurram Khan,et al. Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.
[5] Liu Zhi-meng. An elliptic curve cryptography based on authentication and key agreement protocol for wireless communication , 2008 .
[6] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[7] Mohammad S. Obaidat,et al. An anonymous and provably secure authentication scheme for mobile user , 2016, Int. J. Commun. Syst..
[8] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[9] Chunhua Jin,et al. Secure and efficient data transmission in the Internet of Things , 2015, Telecommunication Systems.
[10] Ping Wang,et al. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment , 2015, IEEE Transactions on Dependable and Secure Computing.
[11] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[12] Ingrid Moerman,et al. A survey on wireless body area networks , 2011, Wirel. Networks.
[13] 王春枝,et al. New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing , 2015 .
[14] Xiaotie Deng,et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.
[15] Bao Li,et al. An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[16] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[17] Kyung Sup Kwak,et al. An efficient certificateless remote anonymous authentication scheme for wireless body area networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[18] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[19] Athanasios V. Vasilakos,et al. Body Area Networks: A Survey , 2010, Mob. Networks Appl..
[20] Chi Sung Laih. Advances in cryptology - ASIACRYPT 2003 : 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003 : proceedings , 2003 .
[21] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[22] Zhenguo Zhao,et al. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.
[23] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[24] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[25] Reihaneh Safavi-Naini,et al. Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings , 2006, ACISP.
[26] I. Mr.SHETHMahammedOvesh,et al. A Survey on Wireless Body Area Network , 2014 .
[27] Eun-Jun Yoon,et al. A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography , 2016, IEEE Access.
[28] Chunhua Jin,et al. Practical access control for sensor networks in the context of the Internet of Things , 2016, Comput. Commun..
[29] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[30] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[31] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[32] Fagen Li,et al. A Provably-Secure Transmission Scheme for Wireless Body Area Networks , 2016, Journal of Medical Systems.
[33] Jung-Sook Kim,et al. EEG Encryption Scheme with Junk Data Using Chaos Maps , 2015, 2015 6th International Conference on Intelligent Systems, Modelling and Simulation.
[34] Mohammed Feham,et al. Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE) , 2011, ArXiv.
[35] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[36] SK Hafizul Islam,et al. Design and analysis of an improved smartcard‐based remote user password authentication scheme , 2016, Int. J. Commun. Syst..