Related references
Note: Only part of the references are listed.Achieving Searchable Encryption Scheme With Search Pattern Hidden
Yunling Wang et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
Content-Centric Group User Authentication for Secure Social Networks
Jian Shen et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2020)
Lightweight Collaborative Authentication With Key Protection for Smart Electronic Health Record System
Qi Feng et al.
IEEE SENSORS JOURNAL (2020)
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing
Jian Shen et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Data-Driven Cybersecurity Incident Prediction: A Survey
Nan Sun et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Secure Authentication and Group Key Distribution Scheme for WBANs Based on Smartphone ECG Sensor
Haowen Tan et al.
IEEE ACCESS (2019)
Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network
Pei-Yih Ting et al.
IEEE SYSTEMS JOURNAL (2018)
Twitter spam detection: Survey of new approaches and comparative study
Tingmin Wu et al.
COMPUTERS & SECURITY (2018)
Detecting and Preventing Cyber Insider Threats: A Survey
Liu Liu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
Cost-Effective and Anonymous Access Control for Wireless Body Area Networks
Fagen Li et al.
IEEE SYSTEMS JOURNAL (2018)
Comments on Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems
Caixue Zhou
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Anonymous and Traceable Group Data Sharing in Cloud Computing
Jian Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
Jian Shen et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings
Liaojun Pang et al.
IEEE ACCESS (2018)
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
Jiaojiao Jiang et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Anonymous Authentication for Wireless Body Area Networks With Provable Security
Debiao He et al.
IEEE SYSTEMS JOURNAL (2017)
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
Jian Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity
Liaojun Pang et al.
PLOS ONE (2016)
Secure and Efficient Data Communication Protocol for Wireless Body Area Networks
Chunqiang Hu et al.
IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS (2016)
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks
Sheng Wen et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks
Hu Xiong et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Anonymous multi-receiver ID-based signcryption scheme
Liaojun Pang et al.
IET INFORMATION SECURITY (2015)
Provable certificateless generalized signcryption scheme
Caixue Zhou et al.
DESIGNS CODES AND CRYPTOGRAPHY (2014)
A Survey on Wireless Body Area Networks: Technologies and Design Challenges
Riccardo Cavallari et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Wireless Body Area Networks: A Survey
Samaneh Movassaghi et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Robust Multi-Factor Authentication for Fragile Communications
Xinyi Huang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2014)
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol
Hu Xiong
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)
Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
Jingwei Liu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Identity-based chameleon hashing and signatures without key exposure
Xiaofeng Chen et al.
INFORMATION SCIENCES (2014)
Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme
Chunqiang Hu et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)
Network Traffic Classification Using Correlation Information
Jun Zhang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks
Daojing He et al.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2013)
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption
Mingwu Zhang et al.
SECURITY AND COMMUNICATION NETWORKS (2012)
PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks
Krishna K. Venkatasubramanian et al.
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2010)
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS
Ming Li et al.
IEEE WIRELESS COMMUNICATIONS (2010)
IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks
Chiu C. Tan et al.
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2009)
Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
A Joux et al.
JOURNAL OF CRYPTOLOGY (2003)
The state of elliptic curve cryptography
N Koblitz et al.
DESIGNS CODES AND CRYPTOGRAPHY (2000)