메뉴 건너뛰기




Volumn 25, Issue 2, 2014, Pages 332-342

Certificateless remote anonymous authentication schemes for wirelessbody area networks

Author keywords

Anonymous authentication; certificateless signature; healthcare; wireless body area network

Indexed keywords

ANONYMOUS AUTHENTICATION; AUTHENTICATION PROTOCOLS; CERTIFICATELESS SIGNATURE; CHOSEN MESSAGE ATTACKS; COMPUTATIONAL OVERHEADS; EXPERIMENTAL SIMULATIONS; WIRELESS BODY AREA NETWORK; WIRELESS SENSOR TECHNOLOGY;

EID: 84891804845     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2013.145     Document Type: Article
Times cited : (293)

References (41)
  • 1
    • 0030380805 scopus 로고    scopus 로고
    • Personal area networks: Near-field intrabody communication
    • T.G. Zimmerman, Personal Area Networks: Near-Field Intrabody Communication, IBM Systems J., vol. 35, no. 3/4, pp. 609-617, 1996. (Pubitemid 126593292)
    • (1996) IBM Systems Journal , vol.35 , Issue.3-4 , pp. 609-617
    • Zimmerman, T.G.1
  • 3
    • 34547371054 scopus 로고    scopus 로고
    • System architecture of a wireless body area sensor network for ubiquitous health monitoring
    • C. Otto, A. Milenkovic, C. Sanders, and E. Jovanov, System Architecture of a Wireless Body Area Sensor Network for Ubiquitous Health Monitoring, J. Mobile Multimedia, vol. 1, no. 4, pp. 307-326, 2006.
    • (2006) J. Mobile Multimedia , vol.1 , Issue.4 , pp. 307-326
    • Otto, C.1    Milenkovic, A.2    Sanders, C.3    Jovanov, E.4
  • 4
    • 84880899444 scopus 로고    scopus 로고
    • A survey on intrabody communications for body area network applications
    • Aug
    • M. Seyedi, B. Kibret, D.T.H. Lai, and M. Faulkner, A Survey on Intrabody Communications for Body Area Network Applications, IEEE Trans. Biomedical Eng., vol. 60, no. 8, pp. 2067-2079, Aug. 2013.
    • (2013) IEEE Trans. Biomedical Eng. , vol.60 , Issue.8 , pp. 2067-2079
    • Seyedi, M.1    Kibret, B.2    Lai, D.T.H.3    Faulkner, M.4
  • 7
    • 79956094375 scopus 로고    scopus 로고
    • Body area networks: A survey
    • M. Chen et al., Body Area Networks: A Survey, Mobile Networks and Applications, vol. 16, pp. 171-193, 2011.
    • (2011) Mobile Networks and Applications , vol.16 , pp. 171-193
    • Chen, M.1
  • 8
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Feb
    • J. Zhu and J. Ma, A New Authentication Scheme with Anonymity for Wireless Environments, IEEE Trans. Consumer Electronics, vol. 50, no. 1, pp. 231-235, Feb. 2004.
    • (2004) IEEE Trans. Consumer Electronics , vol.50 , Issue.1 , pp. 231-235
    • Zhu, J.1    Ma, J.2
  • 10
    • 38049001913 scopus 로고    scopus 로고
    • Novel remote user authentication scheme using bilinear pairings
    • C. Yang, W. Ma, and X. Wang, Novel Remote User Authentication Scheme Using Bilinear Pairings, Proc. Fourth Int'l Conf. (ATC '07), pp. 306-312, 2007.
    • (2007) Proc. Fourth Int'l Conf. (ATC '07) , pp. 306-312
    • Yang, C.1    Ma, W.2    Wang, X.3
  • 12
    • 26444474509 scopus 로고    scopus 로고
    • ID-based authenticated key agreement for low-power mobile devices
    • Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
    • K.Y. Choi, J.Y. Hwang, D.H. Lee, and I.S. Seo, ID-Based Authenticated Key Agreement for Low-Power Mobile Devices, Proc. 10th Australasian Conf. Information Security Privacy (ACISP '05), pp. 494-505, 2005. (Pubitemid 41431805)
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 494-505
    • Choi, K.Y.1    Hwang, J.Y.2    Lee, D.H.3    Seo, I.S.4
  • 14
    • 63049116480 scopus 로고    scopus 로고
    • An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • J. Yang and C. Chang, An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem, Computers & Security, vol. 28, no. 3/4, pp. 138-143, 2009.
    • (2009) Computers & Security , vol.28 , Issue.3-4 , pp. 138-143
    • Yang, J.1    Chang, C.2
  • 15
    • 69549116775 scopus 로고    scopus 로고
    • Identity-based anonymous remote authentication for value-added services in mobile networks
    • Sept
    • X. Cao, X. Zeng, W. Kou, and L. Hu, Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks, IEEE Trans. Vehicular Technology, vol. 58, no. 7, pp. 3508-3517, Sept. 2009.
    • (2009) IEEE Trans. Vehicular Technology , vol.58 , Issue.7 , pp. 3508-3517
    • Cao, X.1    Zeng, X.2    Kou, W.3    Hu, L.4
  • 16
    • 64049088032 scopus 로고    scopus 로고
    • A novel anonymous mutual authentication protocol with provable link-layer location privacy
    • Mar
    • R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, A Novel Anonymous Mutual Authentication Protocol with Provable Link-Layer Location Privacy, IEEE Trans. Vehicular Technology, vol. 58, no. 3, pp. 1454-1466, Mar. 2009.
    • (2009) IEEE Trans. Vehicular Technology , vol.58 , Issue.3 , pp. 1454-1466
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.4    Shen, X.5
  • 19
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels, RFID Security and Privacy: A Research Survey, IEEE J. Selected Areas Comm., vol. 24, no. 2, pp. 381-394, Feb. 2006. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 20
    • 43449134072 scopus 로고    scopus 로고
    • Lightweight cryptographic authentication in passive RFID-Tagged systems
    • DOI 10.1109/TSMCC.2007.913918, Special Issue on Enterprise Computing and Industrial Applications
    • S. Piramuthu, Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems, IEEE Trans. System, Man, and Cybernetics Part C: Applications and Rev., vol. 38, no. 3, pp. 360-376, May 2008. (Pubitemid 351663121)
    • (2008) IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews , vol.38 , Issue.3 , pp. 360-376
    • Piramuthu, S.1
  • 26
    • 84875591362 scopus 로고    scopus 로고
    • An efficient threshold anonymous authentication scheme for privacy-preserving communications
    • Mar
    • J. Ren and L. Harn, An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications, IEEE Trans. Wireless Comm., vol. 12, no. 3, pp. 1018-1025, Mar. 2013.
    • (2013) IEEE Trans. Wireless Comm. , vol.12 , Issue.3 , pp. 1018-1025
    • Ren, J.1    Harn, L.2
  • 28
    • 0037194815 scopus 로고    scopus 로고
    • Id-based signatures from pairings on elliptic curves
    • K.G. Paterson, Id-Based Signatures from Pairings on Elliptic Curves, Electronics Letters, vol. 38, no. 18, pp. 1025-1026, 2002.
    • (2002) Electronics Letters , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.G.1
  • 33
    • 18244396341 scopus 로고    scopus 로고
    • Certificateless signature and proxy signature schemes from bilinear pairings
    • DOI 10.1007/s10986-005-0008-5
    • X. Li, K. Chen, and L. Sun, Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings, Lithuanian Math. J., vol. 45, pp. 76-83, 2005. (Pubitemid 40630178)
    • (2005) Lithuanian Mathematical Journal , vol.45 , Issue.1 , pp. 76-83
    • Li, X.1    Chen, K.2    Sun, L.3
  • 36
    • 78649951132 scopus 로고    scopus 로고
    • An efficient certificateless signature from pairings
    • C.J. Wang, D.Y. Long, and Y. Tang, An Efficient Certificateless Signature from Pairings, Int'l J. Network Security, vol. 8, no. 1, pp. 96-100, 2009.
    • (2009) Int'l J. Network Security , vol.8 , Issue.1 , pp. 96-100
    • Wang, C.J.1    Long, D.Y.2    Tang, Y.3
  • 38
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern, Security Arguments for Digital Signatures and Blind Signatures, J. Cryptology, vol. 13, no. 3, pp. 361-396, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 41
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • DOI 10.1109/TWC.2007.060255
    • K. Ren, W. Lou, K. Zeng, and P.J. Moran, On Broadcast Authentication in Wireless Sensor Networks, IEEE Trans. Wireless Comm., vol. 6, no. 11, pp. 4136-4144, Nov. 2007. (Pubitemid 350121763)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.11 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.