1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks
Published 2016 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks
Authors
Keywords
-
Journal
SENSORS
Volume 16, Issue 5, Pages 728
Publisher
MDPI AG
Online
2016-05-20
DOI
10.3390/s16050728
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- On the security of two identity-based signature schemes based on pairings
- (2016) Zhen Qin et al. INFORMATION PROCESSING LETTERS
- Identity-based encryption with outsourced equality test in cloud computing
- (2016) Sha Ma INFORMATION SCIENCES
- Insecurity of a certificateless aggregate signature scheme
- (2016) Hui Zhang Security and Communication Networks
- Efficient identity-based signature over NTRU lattice
- (2016) Jia Xie et al. Frontiers of Information Technology & Electronic Engineering
- Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks
- (2015) Hu Xiong et al. IEEE Transactions on Information Forensics and Security
- A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety
- (2015) Chunhua Jin et al. JOURNAL OF MEDICAL SYSTEMS
- An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services
- (2015) Yoon-Su Jeong et al. WIRELESS PERSONAL COMMUNICATIONS
- A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
- (2014) Mohammad Sabzinejad Farash et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Certificateless and certificate-based signatures from lattices
- (2014) Miaomiao Tian et al. Security and Communication Networks
- Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks
- (2013) Jingwei Liu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings
- (2012) Debiao He Ad Hoc Networks
- An efficient user authentication and key exchange protocol for mobile client–server environment
- (2010) Tsu-Yang Wu et al. Computer Networks
- Efficient and short certificateless signatures secure against realistic adversaries
- (2010) Raylin Tso et al. JOURNAL OF SUPERCOMPUTING
- Universally Composable RFID Identification and Authentication Protocols
- (2009) Mike Burmester et al. ACM Transactions on Information and System Security
- Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks
- (2009) Xuefei Cao et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- k-Times Anonymous Authentication
- (2009) Isamu TERANISHI et al. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUT
- Efficient and provably-secure certificateless short signature scheme from bilinear pairings
- (2008) Hongzhen Du et al. COMPUTER STANDARDS & INTERFACES
- Breaking the short certificateless signature scheme
- (2008) K SHIM INFORMATION SCIENCES
- An improved bilinear pairing based remote user authentication scheme
- (2007) Thulasi Goriparthi et al. COMPUTER STANDARDS & INTERFACES
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now