-
1
-
-
33744818520
-
Certificateless Public Key Cryptography
-
Springer Berlin Heidelberg
-
Al-Riyami, S.S., Paterson, K.G., Certificateless Public Key Cryptography. 2003, Springer Berlin Heidelberg.
-
(2003)
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
77950347409
-
A view of cloud computing
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., A view of cloud computing. Commun. ACM 53:4 (2013), 50–58.
-
(2013)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
-
3
-
-
84958935292
-
Integration of cloud computing and internet of things: a survey
-
Botta, A., Donato, W.D., Persico, V., Pescap, A., Integration of cloud computing and internet of things: a survey. Future Generat. Comput. Syst. 56 (2016), 684–700.
-
(2016)
Future Generat. Comput. Syst.
, vol.56
, pp. 684-700
-
-
Botta, A.1
Donato, W.D.2
Persico, V.3
Pescap, A.4
-
5
-
-
84916890442
-
New algorithms for secure outsourcing of large-scale systems of linear equations
-
Chen, X., Huang, X., Li, J., Ma, J., Lou, W., Wong, D.S., New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10:1 (2014), 69–78.
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.1
, pp. 69-78
-
-
Chen, X.1
Huang, X.2
Li, J.3
Ma, J.4
Lou, W.5
Wong, D.S.6
-
6
-
-
23044435711
-
Short signatures from the weil pairing
-
Dan, B., Lynn, B., Shacham, H., Short signatures from the weil pairing. J. Cryptol. 17:4 (2004), 297–319.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Dan, B.1
Lynn, B.2
Shacham, H.3
-
7
-
-
4043122631
-
A dynamic id-based remote user authentication scheme
-
Das, M.L., Saxena, A., Gulati, V.P., A dynamic id-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50:2 (2007), 629–631.
-
(2007)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
8
-
-
55749090987
-
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
-
Du, H., Wen, Q., Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Comput. Stand. Interfaces 31:2 (2009), 390–394.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.2
, pp. 390-394
-
-
Du, H.1
Wen, Q.2
-
9
-
-
84930354650
-
-
Fu, Z., Shu, J., Wang, J., Liu, Y., Sungyoung, L., Privacy-preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing, vol. 16, 2015, 453–460.
-
(2015)
Privacy-preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing
, vol.16
, pp. 453-460
-
-
Fu, Z.1
Shu, J.2
Wang, J.3
Liu, Y.4
Sungyoung, L.5
-
10
-
-
84990871477
-
Certificateless public auditing scheme for cloud-assisted wireless body area networks
-
He, D., Zeadally, S., Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J., 2015, 1–10.
-
(2015)
IEEE Syst. J.
, pp. 1-10
-
-
He, D.1
Zeadally, S.2
Wu, L.3
-
11
-
-
85041757351
-
Anonymous authentication for wireless body area networks with provable security
-
He, D., Zeadally, S., Kumar, N., Lee, J.H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. PP(99), 2016, 1–12.
-
(2016)
IEEE Syst. J. PP
, Issue.99
, pp. 1-12
-
-
He, D.1
Zeadally, S.2
Kumar, N.3
Lee, J.H.4
-
12
-
-
85020050894
-
Insight of the protection for data security under selective opening attacks
-
Huang, Z., Liu, S., Mao, X., Chen, K., Li, J., Insight of the protection for data security under selective opening attacks. Inf. Sci. 412–413 (2017), 223–241.
-
(2017)
Inf. Sci.
, vol.412-413
, pp. 223-241
-
-
Huang, Z.1
Liu, S.2
Mao, X.3
Chen, K.4
Li, J.5
-
13
-
-
85042348208
-
A New Remote User Authentication Scheme Using Smart Cards
-
IEEE Press
-
Hwang, M.S., Li, L.H., A New Remote User Authentication Scheme Using Smart Cards. 2000, IEEE Press.
-
(2000)
-
-
Hwang, M.S.1
Li, L.H.2
-
14
-
-
70349303536
-
Securing body sensor networks: sensor association and key management
-
Keoh, S.L., Lupu, E., Sloman, M., Securing body sensor networks: sensor association and key management. IEEE International Conference on Pervasive Computing and Communications, 2009, 1–6.
-
(2009)
IEEE International Conference on Pervasive Computing and Communications
, pp. 1-6
-
-
Keoh, S.L.1
Lupu, E.2
Sloman, M.3
-
15
-
-
0348003132
-
The state of elliptic curve cryptography
-
Koblitz, N., The state of elliptic curve cryptography. Des. Codes Cryptogr. 19:2 (2000), 173–193.
-
(2000)
Des. Codes Cryptogr.
, vol.19
, Issue.2
, pp. 173-193
-
-
Koblitz, N.1
-
16
-
-
84940452998
-
Secure deduplication storage systems supporting keyword search
-
Li, J., Chen, X., Xhafa, F., Barolli, L., Secure deduplication storage systems supporting keyword search. J. Comput. Syst. Sci. 81:8 (2015), 1532–1541.
-
(2015)
J. Comput. Syst. Sci.
, vol.81
, Issue.8
, pp. 1532-1541
-
-
Li, J.1
Chen, X.2
Xhafa, F.3
Barolli, L.4
-
18
-
-
84956969238
-
A survey on wireless body area network: security technology and its design methodology issue
-
Mainanwal, V., Gupta, M., Upadhayay, S.K., A survey on wireless body area network: security technology and its design methodology issue. International Conference on Innovations in Information, Embedded and Communication Systems, 2015, 1–5.
-
(2015)
International Conference on Innovations in Information, Embedded and Communication Systems
, pp. 1-5
-
-
Mainanwal, V.1
Gupta, M.2
Upadhayay, S.K.3
-
19
-
-
84906788546
-
Wireless body area networks: a survey
-
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., Wireless body area networks: a survey. IEEE Commun. Surv. Tutor. 16:3 (2014), 1658–1686.
-
(2014)
IEEE Commun. Surv. Tutor.
, vol.16
, Issue.3
, pp. 1658-1686
-
-
Movassaghi, S.1
Abolhasan, M.2
Lipman, J.3
Smith, D.4
-
20
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Shamir, Adi, Identity-based cryptosystems and signature schemes. Lect. Notes Comput. Sci. 21:2 (1984), 47–53.
-
(1984)
Lect. Notes Comput. Sci.
, vol.21
, Issue.2
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
84973560504
-
An efficient rfid authentication protocol providing strong privacy and security
-
Shen, J., Tan, H., Moh, S., Chung, I., Wang, J., An efficient rfid authentication protocol providing strong privacy and security. J. Internet Technol. 17:3 (2016), 443–455.
-
(2016)
J. Internet Technol.
, vol.17
, Issue.3
, pp. 443-455
-
-
Shen, J.1
Tan, H.2
Moh, S.3
Chung, I.4
Wang, J.5
-
22
-
-
85009460374
-
A lightweight multi-layer authentication protocol for wireless body area networks
-
Shen, J., Chang, S., Shen, J., Liu, Q., Sun, X., A lightweight multi-layer authentication protocol for wireless body area networks. Future Generat. Comput. Syst., 2016, 10.1016/j.future.2016.11.033.
-
(2016)
Future Generat. Comput. Syst.
-
-
Shen, J.1
Chang, S.2
Shen, J.3
Liu, Q.4
Sun, X.5
-
23
-
-
85023594994
-
Block design-based key agreement for group data sharing in cloud computing
-
Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., Xiang, Y., Block design-based key agreement for group data sharing in cloud computing. IEEE Trans. Dependable Secure Comput., 2017, 10.1109/TDSC.2017.2725953.
-
(2017)
IEEE Trans. Dependable Secure Comput.
-
-
Shen, J.1
Zhou, T.2
He, D.3
Zhang, Y.4
Sun, X.5
Xiang, Y.6
-
24
-
-
85017189145
-
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
-
Shen, J., Liu, D., Shen, J., Liu, Q., Sun, X., A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mob. Comput., 2017, 10.1016/j.pmcj.2017.03.013.
-
(2017)
Pervasive Mob. Comput.
-
-
Shen, J.1
Liu, D.2
Shen, J.3
Liu, Q.4
Sun, X.5
-
25
-
-
85020435750
-
An efficient public auditing protocol with novel dynamic structure for cloud data
-
Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W., An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12:10 (2017), 2402–2415.
-
(2017)
IEEE Trans. Inf. Forensics Secur.
, vol.12
, Issue.10
, pp. 2402-2415
-
-
Shen, J.1
Shen, J.2
Chen, X.3
Huang, X.4
Susilo, W.5
-
26
-
-
33846606395
-
Ieee standard specifications for public-key cryptography
-
Std, I., Ieee standard specifications for public-key cryptography. IEEE Comput. Soc. August, 2004, 1–228.
-
(2004)
IEEE Comput. Soc. August
, pp. 1-228
-
-
Std, I.1
-
28
-
-
84885589116
-
Cloud-enabled wireless body area networks for pervasive healthcare
-
Wan, J., Zou, C., Ullah, S., Lai, C.F., Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Netw. 27:5 (2013), 56–61.
-
(2013)
IEEE Netw.
, vol.27
, Issue.5
, pp. 56-61
-
-
Wan, J.1
Zou, C.2
Ullah, S.3
Lai, C.F.4
-
29
-
-
84930202100
-
Cost-effective scalable and anonymous certificateless remote authentication protocol
-
Xiong, H., Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9:12 (2014), 2327–2339.
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.9
, Issue.12
, pp. 2327-2339
-
-
Xiong, H.1
-
30
-
-
84930216224
-
Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks
-
Xiong, H., Qin, Z., Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans. Inf. Forensics Secur. 10:7 (2015), 1442–1455.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.7
, pp. 1442-1455
-
-
Xiong, H.1
Qin, Z.2
-
31
-
-
85019072764
-
Cloud computing security and privacy: standards and regulations
-
Yong, Y., Miyaji, A., Man, H.A., Susilo, W., Cloud computing security and privacy: standards and regulations. Comput. Stand. Interfaces 54 (2017), 1–2.
-
(2017)
Comput. Stand. Interfaces
, vol.54
, pp. 1-2
-
-
Yong, Y.1
Miyaji, A.2
Man, H.A.3
Susilo, W.4
-
32
-
-
84857368369
-
An efficient rsa-based certificateless signature scheme
-
Zhang, J., Mao, J., An efficient rsa-based certificateless signature scheme. J. Syst. Software 85:3 (2012), 638–642.
-
(2012)
J. Syst. Software
, vol.85
, Issue.3
, pp. 638-642
-
-
Zhang, J.1
Mao, J.2
-
33
-
-
78649302229
-
Cloud computing: state-of-the-art and research challenges
-
Zhang, Q., Cheng, L., Boutaba, R., Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1:1 (2010), 7–18.
-
(2010)
J. Internet Serv. Appl.
, vol.1
, Issue.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutaba, R.3
-
34
-
-
84890016395
-
An efficient and lightweight certificateless authentication protocol for wireless body area networks
-
Zhang, L., Liu, J., Sun, R., An efficient and lightweight certificateless authentication protocol for wireless body area networks. International Conference on Intelligent NETWORKING and Collaborative Systems, 2013, 637–639.
-
(2013)
International Conference on Intelligent NETWORKING and Collaborative Systems
, pp. 637-639
-
-
Zhang, L.1
Liu, J.2
Sun, R.3
-
35
-
-
84965170488
-
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
-
Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H., You, I., Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379 (2016), 42–61.
-
(2016)
Inf. Sci.
, vol.379
, pp. 42-61
-
-
Zhang, Y.1
Chen, X.2
Li, J.3
Wong, D.S.4
Li, H.5
You, I.6
-
36
-
-
77953250367
-
Certificateless authentication protocol without pairing
-
Zhu, H., Certificateless authentication protocol without pairing. Geomatics Inf. Sci. Wuhan Univ. 35:5 (2010), 574–577.
-
(2010)
Geomatics Inf. Sci. Wuhan Univ.
, vol.35
, Issue.5
, pp. 574-577
-
-
Zhu, H.1
|