-
1
-
-
84906788546
-
Wireless body area networks: A survey
-
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., and Jamalipour, A., Wireless body area networks: A survey. IEEE Commun. Surv. Tutorials 16(3):1658–1686, 2014.
-
(2014)
IEEE Commun. Surv. Tutorials
, vol.16
, Issue.3
, pp. 1658-1686
-
-
Movassaghi, S.1
Abolhasan, M.2
Lipman, J.3
Smith, D.4
Jamalipour, A.5
-
2
-
-
84871878680
-
China’s rapidly aging population creates policy challenges in shaping a viable long-term care system
-
Feng, Z., Liu, C., Guan, X., and Mor, V., China’s rapidly aging population creates policy challenges in shaping a viable long-term care system. Health Aff. 31(12):2764–2773, 2012.
-
(2012)
Health Aff.
, vol.31
, Issue.12
, pp. 2764-2773
-
-
Feng, Z.1
Liu, C.2
Guan, X.3
Mor, V.4
-
3
-
-
0030380805
-
Personal area networks: near-field intrabody communication
-
Zimmerman, T. G., Personal area networks: near-field intrabody communication. IBM Syst. J. 35(3.4):609–617, 1996.
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3
, pp. 609-617
-
-
Zimmerman, T.G.1
-
4
-
-
84964232726
-
Part 15.6:Wireless body area networks
-
IEEE standard for local and metropolitan area networks: Part 15.6:Wireless body area networks. IEEE, 2012.
-
(2012)
IEEE
-
-
-
5
-
-
84940848791
-
New authentication scheme for wireless body area networks using the bilinear pairing
-
Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39(11):1–8, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, Issue.11
, pp. 1-8
-
-
Wang, C.1
Zhang, Y.2
-
6
-
-
84878597719
-
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
-
Li, X., Ma, J., Wang, W., Xiong, Y., and Zhang, J., A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(1):85–95, 2013.
-
(2013)
Math. Comput. Model.
, vol.58
, Issue.1
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
7
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
Li, X., Niu, J., Khan, M. K., and Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365–1371, 2013.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.5
, pp. 1365-1371
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
Liao, J.4
-
8
-
-
84923405290
-
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
-
Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., and Khan, M. K., A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Netw. 2014. doi:10.1002/sec.1214.
-
(2014)
Secur. Commun. Netw.
-
-
Li, X.1
Niu, J.2
Kumari, S.3
Liao, J.4
Liang, W.5
Khan, M.K.6
-
9
-
-
84908157951
-
Applying biometrics to design three‐factor remote user authentication scheme with key agreement
-
Li, X., Niu, J., Wang, Z., and Chen, C., Applying biometrics to design three‐factor remote user authentication scheme with key agreement. Secur. Commun. Netw. 7(10):1488–1497, 2014.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.10
, pp. 1488-1497
-
-
Li, X.1
Niu, J.2
Wang, Z.3
Chen, C.4
-
10
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120–126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
11
-
-
0000534667
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms. Crypto 84:10–18, 1984.
-
(1984)
Crypto
, vol.84
, pp. 10-18
-
-
ElGamal, T.1
-
12
-
-
84963682665
-
One-to-many authentication for access control in mobile pay-TV systems
-
He, D., Kumar, N., Shen, H., and Lee, J., One-to-many authentication for access control in mobile pay-TV systems. Sci. China Inf. Sci. 2015. doi:10.1007/s11432-015-5469-5.
-
(2015)
Sci. China Inf. Sci.
-
-
He, D.1
Kumar, N.2
Shen, H.3
Lee, J.4
-
13
-
-
34547541295
-
A remote user authentication scheme using bilinear pairings and ECC
-
Jia, Z., Zhang, Y., Shao, H., Lin, Y., and Wang, J., A remote user authentication scheme using bilinear pairings and ECC. In: Sixth International Conference on Intelligent Systems Design and Applications, pp. 1091–1094, 2006.
-
(2006)
Sixth International Conference on Intelligent Systems Design and Applications
, pp. 1091-1094
-
-
Jia, Z.1
Zhang, Y.2
Shao, H.3
Lin, Y.4
Wang, J.5
-
14
-
-
35248853846
-
An efficient scheme for user authentication in wireless sensor networks
-
Jiang, C., Li, B., & Xu, H., An efficient scheme for user authentication in wireless sensor networks. In: 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 438–442, 2007.
-
(2007)
21st International Conference on Advanced Information Networking and Applications Workshops
, pp. 438-442
-
-
Jiang, C.1
Li, B.2
Xu, H.3
-
16
-
-
47849093580
-
International Conference on (pp. 235–240)
-
Abi-char, P. E., Mhamed, A., and El-Hassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In Next Generation Mobile Applications, Services and Technologies, 2007. NGMAST’07. The 2007 International Conference on (pp. 235–240). IEEE, 2007.
-
(2007)
IEEE
, pp. 2007
-
-
Abi-char, P.E.1
Mhamed, A.2
El-Hassan, B.3
-
17
-
-
38049082183
-
X., A distributed electronic authentication scheme based on elliptic curve
-
Chen, Z. G., and Song, X. X., A distributed electronic authentication scheme based on elliptic curve. In: 2007 International Conference on Machine Learning and Cybernetics, pp. 2179–2182, 2007.
-
(2007)
2007 International Conference on Machine Learning and Cybernetics
, pp. 2179-2182
-
-
Chen, Z.G.1
Song, X.2
-
18
-
-
85015402934
-
S., Use of elliptic curves in cryptography
-
Miller, V. S., Use of elliptic curves in cryptography. In: Proceedings of CRYPTO’85. pp. 417–426, 1985.
-
(1985)
Proceedings of CRYPTO’85
, pp. 417-426
-
-
Miller, V.1
-
19
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48(177):203–209, 1987.
-
(1987)
Math. Comput.
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
20
-
-
63049116480
-
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
Yang, J. H., and Chang, C. C., An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3):138–143, 2009.
-
(2009)
Comput. Secur.
, vol.28
, Issue.3
, pp. 138-143
-
-
Yang, J.H.1
Chang, C.C.2
-
21
-
-
69549116775
-
Identity-based anonymous remote authentication for value-added services in mobile networks
-
Cao, X., Zeng, X., Kou, W., and Hu, L., Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7):3508–3517, 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.7
, pp. 3508-3517
-
-
Cao, X.1
Zeng, X.2
Kou, W.3
Hu, L.4
-
22
-
-
84910634929
-
Robust multi-factor authentication for fragile communications
-
Huang, X., Xiang, Y., Bertino, E., Zhou, J., and Xu, L., Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11(6):568–581, 2014.
-
(2014)
IEEE Trans. Dependable Secure Comput.
, vol.11
, Issue.6
, pp. 568-581
-
-
Huang, X.1
Xiang, Y.2
Bertino, E.3
Zhou, J.4
Xu, L.5
-
23
-
-
79959689122
-
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
-
Huang, X., Xiang, Y., Chonka, A., Zhou, J., and Deng, R., A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8):1390–1397, 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.8
, pp. 1390-1397
-
-
Huang, X.1
Xiang, Y.2
Chonka, A.3
Zhou, J.4
Deng, R.5
-
24
-
-
80052774690
-
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
Islam, S. H., and Biswas, G. P., A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892–1898, 2011.
-
(2011)
J. Syst. Softw.
, vol.84
, Issue.11
, pp. 1892-1898
-
-
Islam, S.H.1
Biswas, G.P.2
-
25
-
-
84964246143
-
Anonymous authentication for wireless body area networks with provable security
-
He, D., Zeadally, S., Kumar, N., and Lee, J., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 2016. doi:10.1109/JSYST.2016.2544805.
-
(2016)
IEEE Syst. J.
-
-
He, D.1
Zeadally, S.2
Kumar, N.3
Lee, J.4
-
26
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Shamir, A., Identity-based cryptosystems and signature schemes. Crypto 84:47–53, 1984.
-
(1984)
Crypto
, vol.84
, pp. 47-53
-
-
Shamir, A.1
-
27
-
-
84891804845
-
Certificateless remote anonymous authentication schemes for wireless body area networks
-
Liu, J., Zhang, Z., Chen, X., and Kwak, K. S., Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distrib. Syst. 25(2):332–342, 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 332-342
-
-
Liu, J.1
Zhang, Z.2
Chen, X.3
Kwak, K.S.4
-
28
-
-
84893021026
-
An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem
-
COI: 1:CAS:528:DC%2BC2cXitV2jsLbM
-
Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.2
, pp. 1-7
-
-
Zhao, Z.1
-
29
-
-
84944073824
-
An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks
-
He, D., Zeadally, S., Xu, B., and Huang, X., An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12):1681–2691, 2015.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.12
, pp. 1681-2691
-
-
He, D.1
Zeadally, S.2
Xu, B.3
Huang, X.4
-
30
-
-
85027942960
-
A privacy-aware authentication scheme for distributed mobile cloud computing services
-
Tsai, J. L., and Lo, N. W., A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 9(3):805–815, 2015.
-
(2015)
IEEE Syst. J.
, vol.9
, Issue.3
, pp. 805-815
-
-
Tsai, J.L.1
Lo, N.W.2
-
31
-
-
84927152538
-
Secure and efficient smart-card-based remote user authentication scheme for multiserver environment
-
Shunmuganathan, S., Saravanan, R. D., and Palanichamy, Y., Secure and efficient smart-card-based remote user authentication scheme for multiserver environment. Can. J. Electr. Comput. Eng. 38(1):20–30, 2015.
-
(2015)
Can. J. Electr. Comput. Eng.
, vol.38
, Issue.1
, pp. 20-30
-
-
Shunmuganathan, S.1
Saravanan, R.D.2
Palanichamy, Y.3
-
32
-
-
84938960924
-
An enhancement of a smart card authentication scheme for multi-server architecture
-
Li, X., Niu, J., Kumari, S., Liao, J., and Liang, W., An enhancement of a smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 80(1):175–192, 2015.
-
(2015)
Wirel. Pers. Commun.
, vol.80
, Issue.1
, pp. 175-192
-
-
Li, X.1
Niu, J.2
Kumari, S.3
Liao, J.4
Liang, W.5
-
33
-
-
84869480392
-
ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks
-
Shi, L., Yuan, J., Yu, S., and Li, M., ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (pp. 155–166). ACM, 2013.
-
(2013)
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (pp. 155–166). ACM
-
-
Shi, L.1
Yuan, J.2
Yu, S.3
Li, M.4
-
34
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Berlin: Springer
-
Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. In: Advances in cryptology—EUROCRYPT 2000 (pp. 139–155). Berlin: Springer, 2000.
-
(2000)
Advances in cryptology—EUROCRYPT 2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
35
-
-
35248844436
-
H., An identity-based signature from gap Diffie-Hellman groups
-
Berlin: Springer
-
Choon, J. C., and Cheon, J. H., An identity-based signature from gap Diffie-Hellman groups. In: Public key cryptography—PKC 2003 (pp. 18–30). Berlin: Springer, 2003.
-
(2003)
Public key cryptography—PKC 2003
, pp. 18-30
-
-
Choon, J.C.1
Cheon, J.2
-
36
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., and Stern, J., Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3):361–396, 2000.
-
(2000)
J. Cryptol.
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
37
-
-
77955015028
-
TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks
-
Xiong, X., Wong, D. S., & Deng, X., TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Wireless Communications and Networking Conference (WCNC), 2010 I.E. (pp. 1–6). IEEE, 2010.
-
(2010)
Wireless Communications and Networking Conference (WCNC), 2010 I.E. (pp. 1–6). IEEE
-
-
Xiong, X.1
Wong, D.S.2
Deng, X.3
|