Related references
Note: Only part of the references are listed.Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
Wei Li et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
Chunpeng Ge et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
Xiaoying Jia et al.
IEEE SYSTEMS JOURNAL (2020)
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure
Jing Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment
Jie Cui et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud
Jie Cui et al.
INFORMATION SCIENCES (2019)
Provably Secure Authenticated Key Agreement Scheme for Smart Grid
Vanga Odelu et al.
IEEE TRANSACTIONS ON SMART GRID (2018)
A proxy broadcast re-encryption for cloud data sharing
Maosheng Sun et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2018)
Secure attribute-based data sharing for resource-limited users in cloud computing
Jin Li et al.
COMPUTERS & SECURITY (2018)
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure
Khalid Mahmood et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
Debiao He et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
AKSER: Attribute-based keyword search with efficient revocation in cloud computing
Jie Cui et al.
INFORMATION SCIENCES (2018)
CDAKA: A Provably-Secure Heterogeneous Cross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS
Xiaoxue Liu et al.
JOURNAL OF MEDICAL SYSTEMS (2018)
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
Vanga Odelu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
SeDaSC: Secure Data Sharing in Clouds
Mazhar Ali et al.
IEEE SYSTEMS JOURNAL (2017)
Area-based mobile multicast group key management scheme for secure mobile cooperative sensing
Jie Cui et al.
SCIENCE CHINA-INFORMATION SCIENCES (2017)
A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment
Arij Ben Amor et al.
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) (2017)
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
Peng Xu et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
Kaitai Liang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
Jia-Lun Tsai et al.
IEEE SYSTEMS JOURNAL (2015)
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment
Ruhul Amin et al.
WIRELESS PERSONAL COMMUNICATIONS (2015)
CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances
Bo Li et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2015)
An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
Wen-Bin Hsieh et al.
JOURNAL OF SUPERCOMPUTING (2014)
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Xuefeng Liu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
Dynamic Authentication for Cross-Realm SOA-Based Business Processes
Jie Xu et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2012)
A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network
Rongxing Lu et al.
MOBILE NETWORKS & APPLICATIONS (2011)
Security arguments for digital signatures and blind signatures
D Pointcheval et al.
JOURNAL OF CRYPTOLOGY (2000)