4.6 Article

Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Achieving Searchable Encryption Scheme With Search Pattern Hidden

Yunling Wang et al.

Summary: This article discusses the concept of Searchable Encryption (SE) and its limitations in protecting query privacy. It proposes a new SE scheme that utilizes a special additive homomorphic encryption scheme to achieve multiplicative homomorphic property, increasing the accuracy of search results and enhancing user-side security.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Content-Centric Group User Authentication for Secure Social Networks

Jian Shen et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2020)

Article Engineering, Electrical & Electronic

Lightweight Collaborative Authentication With Key Protection for Smart Electronic Health Record System

Qi Feng et al.

IEEE SENSORS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing

Jian Shen et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Data-Driven Cybersecurity Incident Prediction: A Survey

Nan Sun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Secure Authentication and Group Key Distribution Scheme for WBANs Based on Smartphone ECG Sensor

Haowen Tan et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network

Pei-Yih Ting et al.

IEEE SYSTEMS JOURNAL (2018)

Article Computer Science, Information Systems

Twitter spam detection: Survey of new approaches and comparative study

Tingmin Wu et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Detecting and Preventing Cyber Insider Threats: A Survey

Liu Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Information Systems

Cost-Effective and Anonymous Access Control for Wireless Body Area Networks

Fagen Li et al.

IEEE SYSTEMS JOURNAL (2018)

Editorial Material Computer Science, Theory & Methods

Comments on Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems

Caixue Zhou

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Anonymous and Traceable Group Data Sharing in Cloud Computing

Jian Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

Jian Shen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings

Liaojun Pang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies

Jiaojiao Jiang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Information Systems

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He et al.

IEEE SYSTEMS JOURNAL (2017)

Article Computer Science, Theory & Methods

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Multidisciplinary Sciences

A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity

Liaojun Pang et al.

PLOS ONE (2016)

Article Computer Science, Information Systems

Secure and Efficient Data Communication Protocol for Wireless Body Area Networks

Chunqiang Hu et al.

IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks

Sheng Wen et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Theory & Methods

Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

Hu Xiong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Anonymous multi-receiver ID-based signcryption scheme

Liaojun Pang et al.

IET INFORMATION SECURITY (2015)

Article Computer Science, Theory & Methods

Provable certificateless generalized signcryption scheme

Caixue Zhou et al.

DESIGNS CODES AND CRYPTOGRAPHY (2014)

Article Computer Science, Information Systems

A Survey on Wireless Body Area Networks: Technologies and Design Challenges

Riccardo Cavallari et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Wireless Body Area Networks: A Survey

Samaneh Movassaghi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Hardware & Architecture

Robust Multi-Factor Authentication for Fragile Communications

Xinyi Huang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2014)

Article Computer Science, Theory & Methods

Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol

Hu Xiong

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Theory & Methods

Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks

Jingwei Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

Identity-based chameleon hashing and signatures without key exposure

Xiaofeng Chen et al.

INFORMATION SCIENCES (2014)

Article Engineering, Electrical & Electronic

Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme

Chunqiang Hu et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)

Article Computer Science, Theory & Methods

Network Traffic Classification Using Correlation Information

Jun Zhang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks

Daojing He et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2013)

Article Computer Science, Information Systems

Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

Mingwu Zhang et al.

SECURITY AND COMMUNICATION NETWORKS (2012)

Article Computer Science, Information Systems

PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks

Krishna K. Venkatasubramanian et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2010)

Article Computer Science, Hardware & Architecture

DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS

Ming Li et al.

IEEE WIRELESS COMMUNICATIONS (2010)

Article Computer Science, Information Systems

IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks

Chiu C. Tan et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2009)

Article Computer Science, Theory & Methods

Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups

A Joux et al.

JOURNAL OF CRYPTOLOGY (2003)

Article Computer Science, Theory & Methods

The state of elliptic curve cryptography

N Koblitz et al.

DESIGNS CODES AND CRYPTOGRAPHY (2000)