4.8 Article

Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system

Jian Xu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Hardware & Architecture

Cloud Centric Authentication for Wearable Healthcare Monitoring System

Srinivas Jangirala et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Engineering, Multidisciplinary

A Fast CP-ABE System for Cyber-Physical Security and Privacy in Mobile Healthcare Network

Shulan Wang et al.

IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS (2020)

Article Computer Science, Information Systems

Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare

Hai Tao et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

A lightweight anonymous user authentication and key establishment scheme for wearable devices

Ankur Gupta et al.

COMPUTER NETWORKS (2019)

Proceedings Paper Computer Science, Artificial Intelligence

AI in Healthcare: Ethical and Privacy Challenges

Ivana Bartoletti

ARTIFICIAL INTELLIGENCE IN MEDICINE, AIME 2019 (2019)

Article Computer Science, Information Systems

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things

Sandip Roy et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Automation & Control Systems

Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications

Fadi Al-Turjman et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Automation & Control Systems

PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid

Lingjuan Lyu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment

Ashok Kumar Das et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2018)

Proceedings Paper Computer Science, Interdisciplinary Applications

Incognito: A Method for Obfuscating Web Data

Rahat Masood et al.

WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) (2018)

Article Automation & Control Systems

Next-Generation Big Data Analytics: State of the Art, Challenges, and Future Research Topics

Zhihan Lv et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Computer Science, Hardware & Architecture

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

Xiong Li et al.

COMPUTER NETWORKS (2017)

Article Computer Science, Theory & Methods

End-to-end security scheme for mobility enabled healthcare Internet of Things

Sanaz Rahimi Moosavi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Automation & Control Systems

A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

Prosanta Gope et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)

Article Engineering, Electrical & Electronic

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Chin-Chen Chang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Theory & Methods

Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks

Jingwei Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

The random oracle methodology, revisited

R Canetti et al.

JOURNAL OF THE ACM (2004)