메뉴 건너뛰기




Volumn 61, Issue , 2017, Pages 238-249

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity

Author keywords

Anonymous; Attacks; Authentication; Wireless body area networks

Indexed keywords

AUTHENTICATION; NETWORK SECURITY; SECURITY SYSTEMS; WEARABLE TECHNOLOGY; WIRELESS NETWORKS;

EID: 85013439269     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2017.02.011     Document Type: Article
Times cited : (94)

References (25)
  • 2
    • 84986631527 scopus 로고    scopus 로고
    • A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
    • Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K., A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11 (2016), 2594–2608.
    • (2016) IEEE Trans Inf Forensics Secur , vol.11 , pp. 2594-2608
    • Xia, Z.1    Wang, X.2    Zhang, L.3    Qin, Z.4    Sun, X.5    Ren, K.6
  • 3
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27 (2016), 340–352.
    • (2016) IEEE Trans Parallel Distrib Syst , vol.27 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 4
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98 (2015), 190–200.
    • (2015) IEICE Trans Commun , vol.98 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 5
    • 84995871772 scopus 로고    scopus 로고
    • A belief propagation-based method for task allocation in open and dynamic cloud environments
    • Kong, Y., Zhang, M., Ye, D., A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl Based Syst 115 (2017), 123–132.
    • (2017) Knowl Based Syst , vol.115 , pp. 123-132
    • Kong, Y.1    Zhang, M.2    Ye, D.3
  • 6
    • 84921949907 scopus 로고    scopus 로고
    • Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels
    • Liao, X., Shu, C., Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28 (2015), 21–27.
    • (2015) J Vis Commun Image Represent , vol.28 , pp. 21-27
    • Liao, X.1    Shu, C.2
  • 7
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L., Password authentication with insecure communication. Commun ACM 24 (1981), 770–772.
    • (1981) Commun ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 8
    • 84988420360 scopus 로고    scopus 로고
    • A multiserver biometric authentication scheme for tmis using elliptic curve cryptography
    • Chaudhry, S.A., Khan, M.T., Khan, M.K., Shon, T., A multiserver biometric authentication scheme for tmis using elliptic curve cryptography. J Med Syst, 40, 2016, 230.
    • (2016) J Med Syst , vol.40 , pp. 230
    • Chaudhry, S.A.1    Khan, M.T.2    Khan, M.K.3    Shon, T.4
  • 9
    • 84954436216 scopus 로고    scopus 로고
    • A privacy preserving three-factor authentication protocol for e-health clouds
    • Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D., A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput, 2016, 1–24.
    • (2016) J Supercomput , pp. 1-24
    • Jiang, Q.1    Khan, M.K.2    Lu, X.3    Ma, J.4    He, D.5
  • 10
    • 84935865949 scopus 로고    scopus 로고
    • A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    • He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci 321 (2015), 263–277.
    • (2015) Inf Sci , vol.321 , pp. 263-277
    • He, D.1    Kumar, N.2    Chilamkurti, N.3
  • 11
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multiserver environment
    • He, D., Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9 (2015), 816–823.
    • (2015) IEEE Syst J , vol.9 , pp. 816-823
    • He, D.1    Wang, D.2
  • 12
    • 84938203681 scopus 로고    scopus 로고
    • Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
    • Wang, D., Wang, N., Wang, P., Qing, S., Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf Sci 321 (2015), 162–178.
    • (2015) Inf Sci , vol.321 , pp. 162-178
    • Wang, D.1    Wang, N.2    Wang, P.3    Qing, S.4
  • 13
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
    • Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J., A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58 (2013), 85–95.
    • (2013) Math Comput Model , vol.58 , pp. 85-95
    • Li, X.1    Ma, J.2    Wang, W.3    Xiong, Y.4    Zhang, J.5
  • 14
    • 84988384096 scopus 로고    scopus 로고
    • A bilinear pairing based anonymous authentication scheme in wireless body area networks for mhealth
    • Jiang, Q., Lian, X., Yang, C., Ma, J., Tian, Y., Yang, Y., A bilinear pairing based anonymous authentication scheme in wireless body area networks for mhealth. J Med Syst, 40, 2016, 231.
    • (2016) J Med Syst , vol.40 , pp. 231
    • Jiang, Q.1    Lian, X.2    Yang, C.3    Ma, J.4    Tian, Y.5    Yang, Y.6
  • 15
    • 84891804845 scopus 로고    scopus 로고
    • Certificateless remote anonymous authentication schemes for wirelessbody area networks
    • Liu, J., Zhang, Z., Chen, X., Kwak, K.S., Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans Parallel Distrib Syst 25 (2014), 332–342.
    • (2014) IEEE Trans Parallel Distrib Syst , vol.25 , pp. 332-342
    • Liu, J.1    Zhang, Z.2    Chen, X.3    Kwak, K.S.4
  • 16
    • 84930216224 scopus 로고    scopus 로고
    • Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks
    • Xiong, H., Qin, Z., Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10 (2015), 1442–1455.
    • (2015) IEEE Trans Inf Forensics Secur , vol.10 , pp. 1442-1455
    • Xiong, H.1    Qin, Z.2
  • 17
    • 84982171473 scopus 로고    scopus 로고
    • 1-Raap: an efficient 1-round anonymous authentication protocol for wireless body area networks
    • Liu, J., Zhang, L., Sun, R., 1-Raap: an efficient 1-round anonymous authentication protocol for wireless body area networks. Sensors, 16, 2016, 728.
    • (2016) Sensors , vol.16 , pp. 728
    • Liu, J.1    Zhang, L.2    Sun, R.3
  • 18
    • 84947804555 scopus 로고    scopus 로고
    • Enhanced secure sensor association and key management in wireless body area networks
    • Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., Sun, X., Enhanced secure sensor association and key management in wireless body area networks. J Commun Netw 17 (2015), 453–462.
    • (2015) J Commun Netw , vol.17 , pp. 453-462
    • Shen, J.1    Tan, H.2    Moh, S.3    Chung, I.4    Liu, Q.5    Sun, X.6
  • 20
    • 84963856290 scopus 로고    scopus 로고
    • Efficient implementation of nist-compliant elliptic curve cryptography for 8-bit avr-based sensor nodes
    • Liu, Z., Seo, H., Großschädl, J., Kim, H., Efficient implementation of nist-compliant elliptic curve cryptography for 8-bit avr-based sensor nodes. IEEE Trans Inf Forensics Secur 11 (2016), 1385–1397.
    • (2016) IEEE Trans Inf Forensics Secur , vol.11 , pp. 1385-1397
    • Liu, Z.1    Seo, H.2    Großschädl, J.3    Kim, H.4
  • 21
    • 85031946891 scopus 로고    scopus 로고
    • Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things
    • Liu, Z., Groszschaedl, J., Hu, Z., Jarvinen, K., Wang, H., Verbauwhede, I., Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things. IEEE Trans Comput, 2016.
    • (2016) IEEE Trans Comput
    • Liu, Z.1    Groszschaedl, J.2    Hu, Z.3    Jarvinen, K.4    Wang, H.5    Verbauwhede, I.6
  • 22
    • 84923216123 scopus 로고    scopus 로고
    • Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
    • Li, X., Niu, J., Liao, J., Liang, W., Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst 28 (2015), 374–382.
    • (2015) Int J Commun Syst , vol.28 , pp. 374-382
    • Li, X.1    Niu, J.2    Liao, J.3    Liang, W.4
  • 25
    • 84901189762 scopus 로고    scopus 로고
    • A survey of sip authentication and key agreement schemes
    • Kilinc, H.H., Yanik, T., A survey of sip authentication and key agreement schemes. IEEE Commun Surv Tutorials 16 (2014), 1005–1023.
    • (2014) IEEE Commun Surv Tutorials , vol.16 , pp. 1005-1023
    • Kilinc, H.H.1    Yanik, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.