-
1
-
-
84870504149
-
A new efficient privacypreserving scalar product protocol
-
Amirbekyan, A., and Estivill-Castro, V., A new efficient privacypreserving scalar product protocol. In Proc. of AusDM'07. pp. 209-214, 2007.
-
(2007)
Proc. of AusDM'07
, pp. 209-214
-
-
Amirbekyan, A.1
Estivill-Castro, V.2
-
2
-
-
50249101679
-
Opportunistic computing for wireless sensor networks
-
Avvenuti, M., Corsini, P., Masci, P., and Vecchio, A. Opportunistic computing for wireless sensor networks. In IEEE Proc. of MASS'07. pp. 1-6, 2007.
-
(2007)
IEEE Proc. of MASS'07
, pp. 1-6
-
-
Avvenuti, M.1
Corsini, P.2
Masci, P.3
Vecchio, A.4
-
3
-
-
23144460039
-
Security of public-key cryptosystems based on chebyshev polynomials
-
Bergamo, P., D'Arco, P., De Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst-I 52(7):1382-1393, 2005.
-
(2005)
IEEE Trans. Circ. Syst-I
, vol.52
, Issue.7
, pp. 1382-1393
-
-
Bergamo, P.1
D'Arco, P.2
De Santis, A.3
Kocarev, L.4
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. K. Franklin, Identity-based encryption from the weil pairing, in Proc. of CRYPTO'01, pp. 213-229, 2001.
-
(2001)
Proc. of CRYPTO'01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
5
-
-
0000523051
-
A logic of authentication
-
Burrows, M., Abadi, M., and Needham, R. M., A logic of authentication. Proc. R. Soc. Lond. A 426(1871):233-271, 1989.
-
(1989)
Proc. R. Soc. Lond. A
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
6
-
-
84857051686
-
Improving the efficiency of anonymous routing for manets
-
Chen, J. T., Boreli, R., and Sivaraman,V., Improving the efficiency of anonymous routing for MANETs. Comput. Commun. 35(5):619-627, 2012.
-
(2012)
Comput. Commun
, vol.35
, Issue.5
, pp. 619-627
-
-
Chen, J.T.1
Boreli, R.2
Sivaraman, V.3
-
7
-
-
77956388759
-
From opportunistic networks to opportunistic computing
-
Conti, M., Giordano, S., May, M., and Passarella, A., From opportunistic networks to opportunistic computing. IEEE Commun. Mag. 48(9):126-139, 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.9
, pp. 126-139
-
-
Conti, M.1
Giordano, S.2
May, M.3
Passarella, A.4
-
8
-
-
76649094265
-
Opportunities in opportunistic computing
-
Conti, M., andKumar, M., Opportunities in opportunistic computing. IEEE Comput. 43(1):42-50, 2010.
-
(2010)
IEEE Comput
, vol.43
, Issue.1
, pp. 42-50
-
-
Conti, M.1
Kumar, M.2
-
9
-
-
84927517111
-
Privacy-preserving cooperative statistical analysis
-
W. Du and M. Atallah, Privacy-preserving cooperative statistical analysis, in Proc. of ACSAC'01, pp. 102-111, 2001.
-
(2001)
Proc. Of ACSAC'01
, pp. 102-111
-
-
Du, W.1
Atallah, M.2
-
10
-
-
62949175202
-
Chaotic map based key agreement with/out clock synchronization
-
Han, S., and Chang, E., Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons Fractals 39(3):1283-1289, 2009.
-
(2009)
Chaos Solitons Fractals
, vol.39
, Issue.3
, pp. 1283-1289
-
-
Han, S.1
Chang, E.2
-
11
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149-1157, 2012.
-
(2012)
Nonlinear Dyn
, vol.69
, Issue.3
, pp. 1149-1157
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
12
-
-
78751657441
-
Abaka: An anonymous batch authenticated and key agreement scheme for value-Added services in vehicular ad hoc networks
-
Huang, J. L., Yeh, L. Y., and Chien, H. Y., ABAKA: An anonymous batch authenticated and key agreement scheme for value-Added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1): 248-262, 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.1
, pp. 248-262
-
-
Huang, J.L.1
Yeh, L.Y.2
Chien, H.Y.3
-
13
-
-
84861748201
-
An extended chaotic maps-based key agreement protocol with user anonymity
-
Lee, C. C., Chen, C. L., Wu, C. Y., and Huang, S. Y., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1-2):79-87, 2012.
-
(2012)
Nonlinear Dyn.
, vol.69
, Issue.1-2
, pp. 79-87
-
-
Lee, C.C.1
Chen, C.L.2
Wu, C.Y.3
Huang, S.Y.4
-
14
-
-
84871955339
-
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
-
Lee, C. C., and Hsu, C. W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1-2):201-211, 2013.
-
(2013)
Nonlinear Dyn.
, vol.71
, Issue.1-2
, pp. 201-211
-
-
Lee, C.C.1
Hsu, C.W.2
-
15
-
-
84880254414
-
Toward a secure batch verification with group testing for vanet
-
doi:10.1007/s11276-013-0543-7
-
Lee, C. C., and Lai, Y. M., Toward a secure batch verification with group testing for VANET. Wirel. Netw, 2013. doi:10.1007/s11276-013-0543-7.
-
(2013)
Wirel. Netw
-
-
Lee, C.C.1
Lai, Y.M.2
-
16
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51-58, 2010.
-
(2010)
IEEE Wirel. Commun.
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
17
-
-
67349253018
-
Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
-
Lin, X., Lu, R., Shen, X., Nemoto, Y., and Kato, N., Sage: A strong privacy-preserving scheme against global eavesdropping for Ehealth systems. IEEE J. Select. Areas Commun. 27(4):365-378, 2009.
-
(2009)
IEEE J. Select. Areas Commun.
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
18
-
-
36749076982
-
Gsis: A secure and privacy preserving protocol for vehicular communications
-
Lin, X., Sun, X., Ho, P., and Shen, X., Gsis: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6):3442-3456, 2007.
-
(2007)
IEEE Trans. Veh. Technol.
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.3
Shen, X.4
-
19
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
-
Li, M., Yu, S., Zheng, Y., Ren, K., and Lou,W., Scalable and secure sharing of personal health records in cloud computing using attributebased encryption. IEEE Trans. Parallel Distrib. Syst. 24(1):131-143, 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
20
-
-
74849102302
-
Bubblesensing: Binding sensing tasks to the physical world
-
Lu, H., Lane, N. D., Eisenman, S. B., and Campbell, A. T., Bubblesensing: Binding sensing tasks to the physical world. Pervasive Mob. Comput. 6(1):58-71, 2010.
-
(2010)
Pervasive Mob. Comput
, vol.6
, Issue.1
, pp. 58-71
-
-
Lu, H.1
Lane, N.D.2
Eisenman, S.B.3
Campbell, A.T.4
-
21
-
-
84855674646
-
A secure handshake scheme with symptoms-matching for mhealthcare social network
-
Lu, R., Lin, X., Liang, X., and Shen, X., A secure handshake scheme with symptoms-matching for Mhealthcare social network. Mob. Netw. Appl. 16(6):683-694, 2011.
-
(2011)
Mob. Netw. Appl.
, vol.16
, Issue.6
, pp. 683-694
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
22
-
-
84862685743
-
Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network
-
R. Lu, X. Lin, X. Liang, and X. Shen, Secure handshake with symptoms-matching: the essential to the success of Mhealthcare social network, in Proc. BodyNets'10, pp. 8-15, 2010.
-
Proc.BodyNets'10
, vol.2010
, pp. 8-15
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
23
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in vanets
-
Lu, R., Lin, X., Luan, H., Liang, X., and Shen, X., Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1):86-96, 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Lin, X.2
Luan, H.3
Liang, X.4
Shen, X.5
-
24
-
-
84873848479
-
Spoc: A secure and privacypreserving opportunistic computing framework for mobilehealthcare emergency
-
Lu, R., Lin, X., and Shen, X., SPOC: A secure and privacypreserving opportunistic computing framework for mobilehealthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3): 614-624, 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.3
, pp. 614-624
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
25
-
-
77954592983
-
An intelligent secure and privacy-preserving parking scheme through vehicular communications
-
Lu, R., Lin, X., Zhu, H., and Shen, X., An intelligent secure and privacy-preserving parking scheme through vehicular communications. IEEE Trans. Veh. Technol. 59(6):2772-2785, 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.6
, pp. 2772-2785
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
-
27
-
-
0035336179
-
New explicit conditions of elliptic curve traces for fr-reduction
-
Miyaji, A., Nakabayashi, M., and Takano, S., New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E84-A(5):1234-1243, 2001.
-
(2001)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
28
-
-
78650189746
-
Performance evaluation of service execution in opportunistic computing
-
A. Passarella, M. Conti, E. Borgia, and M. Kumar, Performance evaluation of service execution in opportunistic computing, in Proc. of ACM MSWIM'10, pp. 291-298, 2010.
-
(2010)
Proc.of ACM MSWIM'10
, pp. 291-298
-
-
Passarella, A.1
Conti, M.2
Borgia, E.3
Kumar, M.4
-
29
-
-
77649151691
-
Monitoring patients via a secure and mobile healthcare system
-
Ren, Y., Pazzi, R.W. N., and Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wirel. Commun. 17(1): 59-65, 2010.
-
(2010)
IEEE Wirel.Commun
, vol.17
, Issue.1
, pp. 59-65
-
-
Ren, Y.1
Pazzi, R.W.N.2
Boukerche, A.3
-
30
-
-
77956230334
-
Cross-domain data sharing in distributed electronic health record systems
-
Sun, J., and Fang, Y., Cross-domain data sharing in distributed electronic health record systems. IEEE Trans. Parallel Distrib. Syst. 21(6):754-764, 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.6
, pp. 754-764
-
-
Sun, J.1
Fang, Y.2
-
31
-
-
67651165303
-
Enabling secure service discovery in mobile healthcare enterprise networks
-
Toninelli, A., Montanari, R., and Corradi, A., Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wirel. Commun. 16(3):24-32, 2009.
-
(2009)
IEEE Wirel. Commun.
, vol.16
, Issue.3
, pp. 24-32
-
-
Toninelli, A.1
Montanari, R.2
Corradi, A.3
-
32
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
J. Vaidya and C. Clifton, Privacy preserving association rule mining in vertically partitioned data, in Proc. of ACMKDD'02, pp.639-644, 2002.
-
(2002)
Proc. of ACMKDD'02
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
34
-
-
84856471309
-
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
-
Yoon, E. J., Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7):2735-2740, 2012.
-
(2012)
Commun. Nonlinear Sci. Numer. Simul.
, vol.17
, Issue.7
, pp. 2735-2740
-
-
Yoon, E.J.1
-
35
-
-
35348829192
-
Wireless body sensor network using medical implant band
-
Yuce, M. R., Ng, S. W. P., Myo, N. L., Khan, J. Y., and Liu, W., Wireless body sensor network using medical implant band. J. Med. Syst. 31(6):467-474, 2007.
-
(2007)
J. Med. Syst.
, vol.31
, Issue.6
, pp. 467-474
-
-
Yuce, M.R.1
Ng, S.W.P.2
Myo, N.L.3
Khan, J.Y.4
Liu, W.5
-
36
-
-
40249103088
-
Cryptanalysis of the public key encryption based on multiple chaotic systems
-
Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669-674, 2008.
-
(2008)
Chaos, Solitons Fractals
, vol.37
, Issue.3
, pp. 669-674
-
-
Zhang, L.1
|