-
1
-
-
33749405563
-
Body area networks: Towards a wearable future
-
Munich, Germany, 6-
-
Van Dam, K.; Pitchers, S.; Barnard, M. Body area networks: Towards a wearable future. In Proceedings of the WWRF Kick off Meeting, Munich, Germany, 6-7 March 2001.
-
(2001)
Proceedings of the WWRF Kick off Meeting
-
-
Van Dam, K.1
Pitchers, S.2
Barnard, M.3
-
2
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120-126.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
3
-
-
1942487780
-
New Authentication Scheme with Anonymity for Wireless Environments
-
Zhu, J.; Ma, J. A New Authentication Scheme with Anonymity for Wireless Environments. IEEE Trans. Consum. Electron. 2004, 50, 231-235.
-
(2004)
IEEE Trans. Consum. Electron
, vol.50
, pp. 231-235
-
-
Zhu, J.1
Ma, J.A.2
-
4
-
-
54349089114
-
An improved bilinear pairing based remote user authentication scheme
-
Goriparthi, T.; Das, M.L.; Saxena, A. An improved bilinear pairing based remote user authentication scheme. Comput. Stand. Interfaces 2009, 31, 181-185.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, pp. 181-185
-
-
Goriparthi, T.1
Das, M.L.2
Saxena, A.3
-
5
-
-
84958043300
-
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
-
Chaudhry Shehzad, A.; Sabzinejad Farash, M.; Naqvi, H.; Sher, M. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 2016, 16, 113-139.
-
(2016)
Electron. Commer. Res
, vol.16
, pp. 113-139
-
-
Chaudhry Shehzad, A.1
Sabzinejad Farash, M.2
Naqvi, H.3
Sher, M.4
-
6
-
-
37349011768
-
A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices
-
Beijing, China, 23-2
-
Tseng, Y.M.; Wu, T.Y.; Wu, J.D. A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. In Proceedings of the Computer Software and Applications Conference, Beijing, China, 23-27 July 2007.
-
(2007)
Proceedings of the Computer Software and Applications Conference
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.D.3
-
7
-
-
84953639516
-
A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
-
Sabzinejad Farash, M.; Ahmadian Attari, M. A provably secure and efficient authentication scheme for access control in mobile pay-TV systems. Multimed. Tools Appl. 2016, 75, 405-424.
-
(2016)
Multimed. Tools Appl
, vol.75
, pp. 405-424
-
-
Sabzinejad Farash, M.1
Ahmadian Attari, M.2
-
9
-
-
11244267013
-
-
1st ed.; Springer-Verlag New York: New York, NY, US
-
Hankerson, D.; Menezes, A.; Vanstone, S. Guide to Elliptic Curve Cryptography, 1st ed.; Springer-Verlag New York: New York, NY, USA, 2003; p. 75.
-
(2003)
Guide to Elliptic Curve Cryptography
, pp. 75
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
10
-
-
69549116775
-
Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Network
-
Cao, X.F.; Zeng, X.W.; Kou, W.D.; Hu, L.B. Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Network. IEEE Trans. Veh. Technol. 2009, 58, 3508-3517.
-
(2009)
IEEE Trans. Veh. Technol
, vol.58
, pp. 3508-3517
-
-
Cao, X.F.1
Zeng, X.W.2
Kou, W.D.3
Hu, L.B.4
-
11
-
-
26444474509
-
ID-Based Authenticated Key Agreement for Low-Power Mobile Devices
-
LNCS, 1st ed.; Boyd, C., Juan, M.G.N., Eds.; Springer-Verlag: Berlin, German
-
Choi, K.Y.; Hwang, J.Y.; Lee, D.H.; Seo, I.S. ID-Based Authenticated Key Agreement for Low-Power Mobile Devices. In Information Security and Privacy, LNCS, 1st ed.; Boyd, C., Juan, M.G.N., Eds.; Springer-Verlag: Berlin, Germany, 2005; Volume 3574, pp. 494-505.
-
(2005)
Information Security and Privacy
, vol.3574
, pp. 494-505
-
-
Choi, K.Y.1
Hwang, J.Y.2
Lee, D.H.3
-
12
-
-
77955659710
-
An efficient user authentication and key exchange protocol for mobile client-server environment
-
Wu, T.Y.; Tseng, Y.M. An efficient user authentication and key exchange protocol for mobile client-server environment. Comput. Netw. 2010, 54, 1520-1530.
-
(2010)
Comput. Netw
, vol.54
, pp. 1520-1530
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
13
-
-
84949316817
-
An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services
-
Jeong, Y.S.; Shin, S.S. An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services. Wirel. Pers. Commun. 2016, 86, 7-19.
-
(2016)
Wirel. Pers. Commun
, vol.86
, pp. 7-19
-
-
Jeong, Y.S.1
Shin, S.S.2
-
14
-
-
84957802890
-
Efficient identity-based signature over NTRU lattice
-
Xie, J.; Hu, Y.P.; Gao, J.T.; Gao, W. Efficient identity-based signature over NTRU lattice. Front. Inf. Technol. Electron. Eng. 2016, 17, 135-142.
-
(2016)
Front. Inf. Technol. Electron. Eng
, vol.17
, pp. 135-142
-
-
Xie, J.1
Hu, Y.P.2
Gao, J.T.3
Gao, W.4
-
15
-
-
84958824518
-
On the security of two identity-based signature schemes based on pairings
-
Zhen, Q.; Chen, Y.A.; Wang, Y.L.; Hu, X. On the security of two identity-based signature schemes based on pairings. Inf. Process. Lett. 2016, 116, 416-418.
-
(2016)
Inf. Process. Lett
, vol.116
, pp. 416-418
-
-
Zhen, Q.1
Chen, Y.A.2
Wang, Y.L.3
Hu, X.4
-
16
-
-
84932632711
-
Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications Using Bilinear Pairings over Elliptic Curves
-
Gopal, P.V.S.S.N.; Vasudeva Reddy, P. Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications Using Bilinear Pairings over Elliptic Curves. J. Discret. Math. Sci. Cryptogr. 2015, 8, 385-402.
-
(2015)
J. Discret. Math. Sci. Cryptogr
, vol.8
, pp. 385-402
-
-
Gopal, P.1
Vasudeva Reddy, P.2
-
17
-
-
84949663448
-
A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network
-
nformation and Telecommunication Systems (CITS), Gijon, Spain, 15-17 Jul
-
Gassara, M.; Zarai, F.; Daly, I.; Obaidat, M.S.; Hsiao, K.F. A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network. In Proceedings of the 2015 International Conference on Computer, Information and Telecommunication Systems (CITS), Gijon, Spain, 15-17 July 2015; pp. 1-6.
-
(2015)
Proceedings of the 2015 International Conference on Computer
, pp. 1-6
-
-
Gassara, M.1
Zarai, F.2
Daly, I.3
Obaidat, M.S.4
Hsiao, K.F.5
-
18
-
-
33744776672
-
A novel remote user authentication scheme using bilinear pairings
-
Das, M.L.; Saxena, A.; Gulati, V.P.; Phatak, D.B. A novel remote user authentication scheme using bilinear pairings. Comput. Secur. 2006, 25, 184-189.
-
(2006)
Comput. Secur
, vol.25
, pp. 184-189
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
Phatak, D.B.4
-
19
-
-
84859767453
-
An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings
-
He, D.B. An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad. Hoc. Netw. 2012, 10, 1009-1016.
-
(2012)
Ad. Hoc. Netw
, vol.10
, pp. 1009-1016
-
-
He, D.B.1
-
20
-
-
84945552541
-
Identity-based encryption with outsourced equality test in cloud computing
-
Sha, M. Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 2016, 328, 389-402.
-
(2016)
Inf. Sci
, vol.328
, pp. 389-402
-
-
Sha, M.1
-
21
-
-
0345490607
-
Certificateless Public Key Cryptography
-
LNCS, 1st ed.; Laih, C.-S., Ed.; Springer-Verlag: Berlin, German
-
Al-Riyami, S.S.; Paterson, K.G. Certificateless Public Key Cryptography. In Advances in Cryptology Asiacrypt 03, LNCS, 1st ed.; Laih, C.-S., Ed.; Springer-Verlag: Berlin, Germany, 2003; pp. 452-473.
-
(2003)
Advances in Cryptology Asiacrypt 03
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
22
-
-
84958969836
-
A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings
-
Taipei, Taiwan, 2-
-
Wang, L.L.; Chen, K.F.; Long, Y.; Mao, X.P.; Wang, H.G. A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings. In Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems (INCOS), Taipei, Taiwan, 2-4 September 2015.
-
(2015)
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems (INCOS)
-
-
Wang, L.L.1
Chen, K.F.2
Long, Y.3
Mao, X.P.4
Wang, H.G.5
-
24
-
-
56149108570
-
Breaking the short certificateless signature scheme
-
Shim, K. Breaking the short certificateless signature scheme. Inf. Sci. 2009, 179, 303-306.
-
(2009)
Inf. Sci
, vol.179
, pp. 303-306
-
-
Shim, K.1
-
25
-
-
64149092115
-
Robust and Efficient Authenticated Key Agreement in Mobile Communications
-
Juang, W.S.; Wu, J.L. Robust and Efficient Authenticated Key Agreement in Mobile Communications. Inter. J. Mob. Commun. 2009, 7, 562-579.
-
(2009)
Inter. J. Mob. Commun
, vol.7
, pp. 562-579
-
-
Juang, W.S.1
Wu, J.L.2
-
26
-
-
55749090987
-
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
-
Du, H.Z.; Wen, Q.Y. Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Comput. Stand. Interfaces 2009, 31, 390-394.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, pp. 390-394
-
-
Du, H.Z.1
Wen, Q.Y.2
-
27
-
-
84927701388
-
Certificateless and certificate-based signatures from lattices
-
Tian, M.M.; Huang, L.S. Certificateless and certificate-based signatures from lattices. Secur. Commun. Netw. 2015, 8, 1575-1586.
-
(2015)
Secur. Commun. Netw.
, vol.8
, pp. 1575-1586
-
-
Tian, M.M.1
Huang, L.S.2
-
28
-
-
79951510781
-
Efficient and short certificateless signature secure against realistic adversaries
-
Tso, R.; Yi, X.; Huang, X.Y. Efficient and short certificateless signature secure against realistic adversaries. J. Supercomput. 2011, 55, 173-191.
-
(2011)
J. Supercomput
, vol.55
, pp. 173-191
-
-
Tso, R.1
Yi, X.2
Huang, X.Y.3
-
29
-
-
77949864345
-
Lightweight Authentication Protocol for Mobile RFID Networks
-
Yang, M.H.; Zhang, F.T. Lightweight Authentication Protocol for Mobile RFID Networks. Inter. J. Secur. Netw. 2010, 5, 53-62.
-
(2010)
Inter. J. Secur. Netw
, vol.5
, pp. 53-62
-
-
Yang, M.H.1
Zhang, F.T.2
-
30
-
-
84891804845
-
Certificateless Remote Anonymous Authentication Schemes forWireless Body Area Networks
-
Liu, J.W.; Zhang, Z.H.; Chen, X.F.; Kwak, K.S. Certificateless Remote Anonymous Authentication Schemes forWireless Body Area Networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 332-342.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, pp. 332-342
-
-
Liu, J.W.1
Zhang, Z.H.2
Chen, X.F.3
Kwak, K.S.4
-
31
-
-
84930216224
-
Revocable and Scalable Certificateless Remote Authentication Protocal with Anonymity for Wireless Body Area Networks
-
Xiong, H.; Qin, Z.G. Revocable and Scalable Certificateless Remote Authentication Protocal with Anonymity for Wireless Body Area Networks. IEEE Trans. Inf. Forensice Secur. 2015, 10, 1442-1455.
-
(2015)
IEEE Trans. Inf. Forensice Secur
, vol.10
, pp. 1442-1455
-
-
Xiong, H.1
Qin, Z.G.2
-
32
-
-
84947253270
-
Mutual Authentication Protocol to Enhance Patient Medication Safety
-
Jin, C.H.; Xu, C.X.; Zhang, X.J.; Li, F.G. A Secure ECC-Based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety. J. Med. Syst. 2016, 40, 12.
-
(2016)
J. Med. Syst
, vol.40
, pp. 12
-
-
Jin, C.H.1
Xu, C.X.2
Zhang, X.J.3
Li, F.4
Secure Ecc-Based, R.5
-
33
-
-
77954709221
-
Anonymous Authentication with TLS and DAA
-
Berlin, Germany, 21-2
-
Cesena, E.; Löhr, H.; Ramunno, G.; Sadeghi, A.; Vernizzi, D. Anonymous Authentication with TLS and DAA. In Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Berlin, Germany, 21-23 June 2010.
-
(2010)
Proceedings of the 3Rd International Conference on Trust and Trustworthy Computing
-
-
Cesena, E.1
Löhr, H.2
Ramunno, G.3
Sadeghi, A.4
Vernizzi, D.5
-
34
-
-
76849106311
-
Universally composable RFID identification and authentication protocols
-
Burmester, M.; Van Le, T.; De Medeiros, B.; Tsudik, G. Universally composable RFID identification and authentication protocols. ACM Trans. Inf. Syst. Secur. 2009, 12.
-
(2009)
ACM Trans. Inf. Syst. Secur
, pp. 12
-
-
Burmester, M.1
Van Le, T.2
De Medeiros, B.3
Tsudik, G.4
-
35
-
-
84944319062
-
An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens
-
Columbus, OH, USA, 29 June-
-
Chen, M.; Chen, S.G. An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens. In Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS), Columbus, OH, USA, 29 June-2 July 2015.
-
(2015)
Proceedings of the 2015 IEEE 35Th International Conference on Distributed Computing Systems (ICDCS)
-
-
Chen, M.1
Chen, S.G.2
-
36
-
-
49949100301
-
Nano ECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
-
1st ed.; Roberto, V., Ed.; Springer-Verlag: Berlin, German
-
Szczechowiak, P.; Oliveira, L.B.; Scott, M.; Collier, M.; Dahab, R. Nano ECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In Wireless Sensor Networks, 1st ed.; Roberto, V., Ed.; Springer-Verlag: Berlin, Germany, 2008; Volume 4913, pp. 305-320.
-
(2008)
Wireless Sensor Networks
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
37
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
Ren, K.; Lou, W.; Zeng, K.; Moran, P.J. On broadcast authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2007, 6, 4136-4144.
-
(2007)
IEEE Trans. Wirel. Commun
, vol.6
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.J.4
-
38
-
-
84982110434
-
-
Intell®PXA270 Processor Electrical, accessed on 12 May 201
-
Intell®PXA270 Processor Electrical, Mechanical, and Thermal Specification. Available online: http://pdf. dzsc.com/CXX/NHPXA270Cxxx.pdf (accessed on 12 May 2016).
-
Mechanical, and Thermal Specification.
-
-
-
39
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Washington, DC, USA, 8-1
-
Wander, A.S.; Gura, N.; Eberle, H.; Gupta, V.; Shantz, S. Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, Washington, DC, USA, 8-12 March 2005.
-
(2005)
Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
|