Related references
Note: Only part of the references are listed.Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing
Yinghui Zhang et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)
Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network
Yongjun Ren et al.
SENSORS (2019)
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT
Yinghui Zhang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)
A Review of Secure and Privacy-Preserving Medical Data Sharing
Hao Jin et al.
IEEE ACCESS (2019)
EACMS: Emergency Access Control Management System for Personal Health Record Based on Blockchain
Ahmed Raza Rajput et al.
IEEE ACCESS (2019)
An Enhanced Certificateless Signcryption in the Standard Model
Ming Luo et al.
WIRELESS PERSONAL COMMUNICATIONS (2018)
Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
Arijit Karati et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Bitcoin-based fair payments for outsourcing computations of fog devices
Hui Huang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
Debiao He et al.
IEEE SYSTEMS JOURNAL (2018)
Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments
Arijit Karati et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing
Yinghui Zhang et al.
INFORMATION SCIENCES (2018)
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain
Yinghui Zhang et al.
IEEE ACCESS (2018)
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
Yinghui Zhang et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Certificateless online/offline signcryption for the Internet of Things
Fagen Li et al.
WIRELESS NETWORKS (2017)
Efficient identity-based online/offline encryption and signcryption with short ciphertext
Jianchang Lai et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2017)
Consensus Problems for Discrete-time Agents with Communication Delay
Zhenhua Wang et al.
INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS (2017)
Blockchain distributed ledger technologies for biomedical and health care applications
Tsung-Ting Kuo et al.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2017)
A Novel Identity-Based Signcryption Scheme in the Standard Model
Yueying Huang et al.
INFORMATION (2017)
Blockchain Beyond Bitcoin
Sarah Underwood
COMMUNICATIONS OF THE ACM (2016)
Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control
Xiao Yue et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
Practical Signcryption for Secure Communication of Wireless Sensor Networks
Fagen Li et al.
WIRELESS PERSONAL COMMUNICATIONS (2016)
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption
Jianghua Liu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)
Software Implementation of an Attribute-Based Encryption Scheme
Eric Zavattoni et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
Jinguang Han et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks
Hu Xiong et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Certificateless online/offline signcryption scheme
Jiguo Li et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
On the security of a certificateless online/offline signcryption for Internet of Things
Wenbo Shi et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)
S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks
Kyung-Ah Shim
AD HOC NETWORKS (2014)
Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
Jingwei Liu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
Kim-Kwang Raymond Choo et al.
INFORMATION SCIENCES (2014)
An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks
Ye Tian et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2014)
AGREE: exploiting energy harvesting to support data-centric access control in WSNs
Giuseppe Bianchi et al.
AD HOC NETWORKS (2013)
εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
Kyung-Ah Shim et al.
AD HOC NETWORKS (2013)
Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme
Chunqiang Hu et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Ming Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
On security of a certificateless signcryption scheme
Songqin Miao et al.
INFORMATION SCIENCES (2013)
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
Xiangxue Li et al.
MATHEMATICAL AND COMPUTER MODELLING (2013)
Attribute-based signature scheme with constant size signature in the standard model
A-J Ge et al.
IET INFORMATION SECURITY (2012)
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Leonardo B. Oliveira et al.
COMPUTER COMMUNICATIONS (2011)
Heterogeneous Signcryption with Key Privacy
Qiong Huang et al.
COMPUTER JOURNAL (2011)
Cryptanalysis of a certificateless signcryption scheme in the standard model
Jian Weng et al.
INFORMATION SCIENCES (2011)
A survey on wireless body area networks
Benoit Latre et al.
WIRELESS NETWORKS (2011)
Fine-grained data access control for distributed sensor networks
Junbeom Hur
WIRELESS NETWORKS (2011)
Attribute-based on-demand multicast group setup with membership anonymity
Shucheng Yu et al.
COMPUTER NETWORKS (2010)
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS
Ming Li et al.
IEEE WIRELESS COMMUNICATIONS (2010)
Hidden attribute-based signatures without anonymity revocation
Jin Li et al.
INFORMATION SCIENCES (2010)
Efficient signcryption between TPKC and IDPKC and its multi-receiver construction
Sun YinXia et al.
SCIENCE CHINA-INFORMATION SCIENCES (2010)
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Xuefei Cao et al.
COMPUTER COMMUNICATIONS (2008)