-
1
-
-
79956094375
-
Body area networks: a survey
-
Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., Leung, V.C., Body area networks: a survey. Mobile NetwAppl 16 (2011), 171–193.
-
(2011)
Mobile NetwAppl
, vol.16
, pp. 171-193
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.C.5
-
2
-
-
84986631527
-
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
-
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K., A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11 (2016), 2594–2608.
-
(2016)
IEEE Trans Inf Forensics Secur
, vol.11
, pp. 2594-2608
-
-
Xia, Z.1
Wang, X.2
Zhang, L.3
Qin, Z.4
Sun, X.5
Ren, K.6
-
3
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27 (2016), 340–352.
-
(2016)
IEEE Trans Parallel Distrib Syst
, vol.27
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
4
-
-
84922280033
-
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98 (2015), 190–200.
-
(2015)
IEICE Trans Commun
, vol.98
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
5
-
-
84995871772
-
A belief propagation-based method for task allocation in open and dynamic cloud environments
-
Kong, Y., Zhang, M., Ye, D., A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl Based Syst 115 (2017), 123–132.
-
(2017)
Knowl Based Syst
, vol.115
, pp. 123-132
-
-
Kong, Y.1
Zhang, M.2
Ye, D.3
-
6
-
-
84921949907
-
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels
-
Liao, X., Shu, C., Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28 (2015), 21–27.
-
(2015)
J Vis Commun Image Represent
, vol.28
, pp. 21-27
-
-
Liao, X.1
Shu, C.2
-
7
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L., Password authentication with insecure communication. Commun ACM 24 (1981), 770–772.
-
(1981)
Commun ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
8
-
-
84988420360
-
A multiserver biometric authentication scheme for tmis using elliptic curve cryptography
-
Chaudhry, S.A., Khan, M.T., Khan, M.K., Shon, T., A multiserver biometric authentication scheme for tmis using elliptic curve cryptography. J Med Syst, 40, 2016, 230.
-
(2016)
J Med Syst
, vol.40
, pp. 230
-
-
Chaudhry, S.A.1
Khan, M.T.2
Khan, M.K.3
Shon, T.4
-
9
-
-
84954436216
-
A privacy preserving three-factor authentication protocol for e-health clouds
-
Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D., A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput, 2016, 1–24.
-
(2016)
J Supercomput
, pp. 1-24
-
-
Jiang, Q.1
Khan, M.K.2
Lu, X.3
Ma, J.4
He, D.5
-
10
-
-
84935865949
-
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
-
He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci 321 (2015), 263–277.
-
(2015)
Inf Sci
, vol.321
, pp. 263-277
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
-
11
-
-
85027949488
-
Robust biometrics-based authentication scheme for multiserver environment
-
He, D., Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9 (2015), 816–823.
-
(2015)
IEEE Syst J
, vol.9
, pp. 816-823
-
-
He, D.1
Wang, D.2
-
12
-
-
84938203681
-
Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
-
Wang, D., Wang, N., Wang, P., Qing, S., Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf Sci 321 (2015), 162–178.
-
(2015)
Inf Sci
, vol.321
, pp. 162-178
-
-
Wang, D.1
Wang, N.2
Wang, P.3
Qing, S.4
-
13
-
-
84878597719
-
A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
-
Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J., A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58 (2013), 85–95.
-
(2013)
Math Comput Model
, vol.58
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
14
-
-
84988384096
-
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mhealth
-
Jiang, Q., Lian, X., Yang, C., Ma, J., Tian, Y., Yang, Y., A bilinear pairing based anonymous authentication scheme in wireless body area networks for mhealth. J Med Syst, 40, 2016, 231.
-
(2016)
J Med Syst
, vol.40
, pp. 231
-
-
Jiang, Q.1
Lian, X.2
Yang, C.3
Ma, J.4
Tian, Y.5
Yang, Y.6
-
15
-
-
84891804845
-
Certificateless remote anonymous authentication schemes for wirelessbody area networks
-
Liu, J., Zhang, Z., Chen, X., Kwak, K.S., Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans Parallel Distrib Syst 25 (2014), 332–342.
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, pp. 332-342
-
-
Liu, J.1
Zhang, Z.2
Chen, X.3
Kwak, K.S.4
-
16
-
-
84930216224
-
Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks
-
Xiong, H., Qin, Z., Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10 (2015), 1442–1455.
-
(2015)
IEEE Trans Inf Forensics Secur
, vol.10
, pp. 1442-1455
-
-
Xiong, H.1
Qin, Z.2
-
17
-
-
84982171473
-
1-Raap: an efficient 1-round anonymous authentication protocol for wireless body area networks
-
Liu, J., Zhang, L., Sun, R., 1-Raap: an efficient 1-round anonymous authentication protocol for wireless body area networks. Sensors, 16, 2016, 728.
-
(2016)
Sensors
, vol.16
, pp. 728
-
-
Liu, J.1
Zhang, L.2
Sun, R.3
-
18
-
-
84947804555
-
Enhanced secure sensor association and key management in wireless body area networks
-
Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., Sun, X., Enhanced secure sensor association and key management in wireless body area networks. J Commun Netw 17 (2015), 453–462.
-
(2015)
J Commun Netw
, vol.17
, pp. 453-462
-
-
Shen, J.1
Tan, H.2
Moh, S.3
Chung, I.4
Liu, Q.5
Sun, X.6
-
19
-
-
0345490607
-
Certificateless public key cryptography
-
Al-Riyami, S.S., Paterson, K.G., Certificateless public key cryptography. International conference on the theory and application of cryptology and information security, Springer, 2003, 452–473.
-
(2003)
International conference on the theory and application of cryptology and information security, Springer
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
20
-
-
84963856290
-
Efficient implementation of nist-compliant elliptic curve cryptography for 8-bit avr-based sensor nodes
-
Liu, Z., Seo, H., Großschädl, J., Kim, H., Efficient implementation of nist-compliant elliptic curve cryptography for 8-bit avr-based sensor nodes. IEEE Trans Inf Forensics Secur 11 (2016), 1385–1397.
-
(2016)
IEEE Trans Inf Forensics Secur
, vol.11
, pp. 1385-1397
-
-
Liu, Z.1
Seo, H.2
Großschädl, J.3
Kim, H.4
-
21
-
-
85031946891
-
Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things
-
Liu, Z., Groszschaedl, J., Hu, Z., Jarvinen, K., Wang, H., Verbauwhede, I., Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things. IEEE Trans Comput, 2016.
-
(2016)
IEEE Trans Comput
-
-
Liu, Z.1
Groszschaedl, J.2
Hu, Z.3
Jarvinen, K.4
Wang, H.5
Verbauwhede, I.6
-
22
-
-
84923216123
-
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
-
Li, X., Niu, J., Liao, J., Liang, W., Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst 28 (2015), 374–382.
-
(2015)
Int J Commun Syst
, vol.28
, pp. 374-382
-
-
Li, X.1
Niu, J.2
Liao, J.3
Liang, W.4
-
23
-
-
85029959630
-
An improved remote user authentication scheme using elliptic curve cryptography
-
Chaudhry, S.A., Naqvi, H., Mahmood, K., Ahmad, H.F., Khan, M.K., An improved remote user authentication scheme using elliptic curve cryptography. Wireless Pers Commun, 2016, 1–19.
-
(2016)
Wireless Pers Commun
, pp. 1-19
-
-
Chaudhry, S.A.1
Naqvi, H.2
Mahmood, K.3
Ahmad, H.F.4
Khan, M.K.5
-
24
-
-
0000523051
-
A logic of authentication
-
The Royal Society
-
Burrows, M., Abadi, M., Needham, R.M., A logic of authentication. Proceedings of the royal society of London A: mathematical, physical and engineering sciences, vol. 426, 1989, 233–271 The Royal Society.
-
(1989)
Proceedings of the royal society of London A: mathematical, physical and engineering sciences
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
25
-
-
84901189762
-
A survey of sip authentication and key agreement schemes
-
Kilinc, H.H., Yanik, T., A survey of sip authentication and key agreement schemes. IEEE Commun Surv Tutorials 16 (2014), 1005–1023.
-
(2014)
IEEE Commun Surv Tutorials
, vol.16
, pp. 1005-1023
-
-
Kilinc, H.H.1
Yanik, T.2
|