4.2 Article

Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing

Yinghui Zhang et al.

Summary: Cloud computing is a milestone in the development of outsourcing services, but trust issues between users and providers may impede its wide adoption. BPay, a blockchain-based outsourcing service fair payment framework, ensures secure and fair payment without relying on any third party.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Automation & Control Systems

Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT

Yinghui Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Review Computer Science, Information Systems

A Review of Secure and Privacy-Preserving Medical Data Sharing

Hao Jin et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

EACMS: Emergency Access Control Management System for Personal Health Record Based on Blockchain

Ahmed Raza Rajput et al.

IEEE ACCESS (2019)

Article Telecommunications

An Enhanced Certificateless Signcryption in the Standard Model

Ming Luo et al.

WIRELESS PERSONAL COMMUNICATIONS (2018)

Article Computer Science, Information Systems

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments

Arijit Karati et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Theory & Methods

Bitcoin-based fair payments for outsourcing computations of fog devices

Hui Huang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks

Debiao He et al.

IEEE SYSTEMS JOURNAL (2018)

Article Automation & Control Systems

Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments

Arijit Karati et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing

Yinghui Zhang et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain

Yinghui Zhang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

Yinghui Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Certificateless online/offline signcryption for the Internet of Things

Fagen Li et al.

WIRELESS NETWORKS (2017)

Article Computer Science, Information Systems

Efficient identity-based online/offline encryption and signcryption with short ciphertext

Jianchang Lai et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2017)

Article Automation & Control Systems

Consensus Problems for Discrete-time Agents with Communication Delay

Zhenhua Wang et al.

INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS (2017)

Review Computer Science, Information Systems

Blockchain distributed ledger technologies for biomedical and health care applications

Tsung-Ting Kuo et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2017)

Article Computer Science, Information Systems

A Novel Identity-Based Signcryption Scheme in the Standard Model

Yueying Huang et al.

INFORMATION (2017)

News Item Computer Science, Hardware & Architecture

Blockchain Beyond Bitcoin

Sarah Underwood

COMMUNICATIONS OF THE ACM (2016)

Article Health Care Sciences & Services

Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control

Xiao Yue et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Telecommunications

Practical Signcryption for Secure Communication of Wireless Sensor Networks

Fagen Li et al.

WIRELESS PERSONAL COMMUNICATIONS (2016)

Article Computer Science, Theory & Methods

Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption

Jianghua Liu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)

Article Computer Science, Hardware & Architecture

Software Implementation of an Attribute-Based Encryption Scheme

Eric Zavattoni et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Theory & Methods

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption

Jinguang Han et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

Hu Xiong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Certificateless online/offline signcryption scheme

Jiguo Li et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Information Systems

On the security of a certificateless online/offline signcryption for Internet of Things

Wenbo Shi et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Article Computer Science, Information Systems

S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks

Kyung-Ah Shim

AD HOC NETWORKS (2014)

Article Computer Science, Theory & Methods

Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks

Jingwei Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols

Kim-Kwang Raymond Choo et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Information Systems

An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks

Ye Tian et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2014)

Article Computer Science, Information Systems

AGREE: exploiting energy harvesting to support data-centric access control in WSNs

Giuseppe Bianchi et al.

AD HOC NETWORKS (2013)

Article Computer Science, Information Systems

εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks

Kyung-Ah Shim et al.

AD HOC NETWORKS (2013)

Article Engineering, Electrical & Electronic

Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme

Chunqiang Hu et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)

Article Computer Science, Theory & Methods

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

Ming Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

On security of a certificateless signcryption scheme

Songqin Miao et al.

INFORMATION SCIENCES (2013)

Article Computer Science, Interdisciplinary Applications

Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model

Xiangxue Li et al.

MATHEMATICAL AND COMPUTER MODELLING (2013)

Article Computer Science, Information Systems

Attribute-based signature scheme with constant size signature in the standard model

A-J Ge et al.

IET INFORMATION SECURITY (2012)

Article Computer Science, Information Systems

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

Leonardo B. Oliveira et al.

COMPUTER COMMUNICATIONS (2011)

Article Computer Science, Hardware & Architecture

Heterogeneous Signcryption with Key Privacy

Qiong Huang et al.

COMPUTER JOURNAL (2011)

Article Computer Science, Information Systems

Cryptanalysis of a certificateless signcryption scheme in the standard model

Jian Weng et al.

INFORMATION SCIENCES (2011)

Article Computer Science, Information Systems

A survey on wireless body area networks

Benoit Latre et al.

WIRELESS NETWORKS (2011)

Article Computer Science, Information Systems

Fine-grained data access control for distributed sensor networks

Junbeom Hur

WIRELESS NETWORKS (2011)

Article Computer Science, Hardware & Architecture

Attribute-based on-demand multicast group setup with membership anonymity

Shucheng Yu et al.

COMPUTER NETWORKS (2010)

Article Computer Science, Hardware & Architecture

DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS

Ming Li et al.

IEEE WIRELESS COMMUNICATIONS (2010)

Article Computer Science, Information Systems

Hidden attribute-based signatures without anonymity revocation

Jin Li et al.

INFORMATION SCIENCES (2010)

Article Computer Science, Information Systems

Efficient signcryption between TPKC and IDPKC and its multi-receiver construction

Sun YinXia et al.

SCIENCE CHINA-INFORMATION SCIENCES (2010)

Article Computer Science, Information Systems

IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks

Xuefei Cao et al.

COMPUTER COMMUNICATIONS (2008)