Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
Authors
Keywords
-
Journal
Peer-to-Peer Networking and Applications
Volume -, Issue -, Pages -
Publisher
Springer Nature America, Inc
Online
2018-10-26
DOI
10.1007/s12083-018-0696-3
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT
- (2018) Jianbing Ni et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- New Verification Strategy for Finger-Vein Recognition System
- (2018) Chih-Hsien Hsia IEEE SENSORS JOURNAL
- PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications
- (2018) Jie Xu et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- Block Design-based Key Agreement for Group Data Sharing in Cloud Computing
- (2018) Jian Shen et al. IEEE Transactions on Dependable and Secure Computing
- Anonymous and Traceable Group Data Sharing in Cloud Computing
- (2018) Jian Shen et al. IEEE Transactions on Information Forensics and Security
- Cloud Based Data Protection in Anonymously Controlled SDN
- (2018) Jian Shen et al. Security and Communication Networks
- A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things
- (2018) Chen Wang et al. Security and Communication Networks
- A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data
- (2018) Jian Shen et al. IEEE Transactions on Emerging Topics in Computing
- An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
- (2017) Jian Shen et al. IEEE Transactions on Information Forensics and Security
- Finger-vein recognition based on parametric-oriented corrections
- (2017) Chih-Hsien Hsia et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things
- (2017) Jian Shen et al. IEEE Internet of Things Journal
- Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing
- (2017) Jian Shen et al. IEEE Transactions on Emerging Topics in Computing
- Verifiable Computation over Large Database with Incremental Updates
- (2016) Xiaofeng Chen et al. IEEE TRANSACTIONS ON COMPUTERS
- Editorial: A special section on “Emerging Platform Technologies”
- (2016) Changhoon Lee et al. JOURNAL OF SUPERCOMPUTING
- Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks
- (2016) Jian Shen et al. IEEE Access
- Bridging e-Health and the Internet of Things: The SPHERE Project
- (2015) Ni Zhu et al. IEEE INTELLIGENT SYSTEMS
- Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
- (2015) Ding Wang et al. INFORMATION SCIENCES
- VLSI implementation of an ultra-low-cost and low-power image compressor for wireless camera networks
- (2015) Shih-Lun Chen et al. Journal of Real-Time Image Processing
- New Algorithms for Secure Outsourcing of Modular Exponentiations
- (2013) Xiaofeng Chen et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Dynamic ID-based remote user password authentication schemes using smart cards: A review
- (2012) R. Madhusudhan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started