LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices
Authors
Keywords
-
Journal
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
Volume 2018, Issue -, Pages 1-14
Publisher
Hindawi Limited
Online
2018-07-16
DOI
10.1155/2018/9436120
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices
- (2018) Ding Wang et al. IEEE Systems Journal
- Block Design-based Key Agreement for Group Data Sharing in Cloud Computing
- (2018) Jian Shen et al. IEEE Transactions on Dependable and Secure Computing
- Anonymous and Traceable Group Data Sharing in Cloud Computing
- (2018) Jian Shen et al. IEEE Transactions on Information Forensics and Security
- Effects of Heterogeneous Mobility on D2D- and Drone-Assisted Mission-Critical MTC in 5G
- (2017) Antonino Orsino et al. IEEE COMMUNICATIONS MAGAZINE
- Anonymous Authentication for Wireless Body Area Networks With Provable Security
- (2017) Debiao He et al. IEEE Systems Journal
- An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
- (2017) Jian Shen et al. IEEE Transactions on Information Forensics and Security
- Zipf’s Law in Passwords
- (2017) Ding Wang et al. IEEE Transactions on Information Forensics and Security
- iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning
- (2017) Jun Yu et al. IEEE Transactions on Information Forensics and Security
- Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
- (2017) Qi Jiang et al. Journal of Ambient Intelligence and Humanized Computing
- Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things
- (2017) Jian Shen et al. IEEE Internet of Things Journal
- Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing
- (2017) Jian Shen et al. IEEE Transactions on Emerging Topics in Computing
- Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
- (2016) Ding Wang et al. IEEE Transactions on Dependable and Secure Computing
- Rethinking Permission Enforcement Mechanism on Mobile Systems
- (2016) Yuan Zhang et al. IEEE Transactions on Information Forensics and Security
- Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
- (2016) Debiao He et al. IEEE Transactions on Information Forensics and Security
- Robust Biometrics-Based Authentication Scheme for Multiserver Environment
- (2015) Debiao He et al. IEEE Systems Journal
- Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
- (2015) Ding Wang et al. IEEE Transactions on Dependable and Secure Computing
- Universally composable secure positioning in the bounded retrieval model
- (2015) JunWei Zhang et al. Science China-Information Sciences
- A readability analysis for QR code application in a traceability system
- (2014) Laslo Tarjan et al. COMPUTERS AND ELECTRONICS IN AGRICULTURE
- Anonymous two-factor authentication for consumer roaming service in global mobility networks
- (2014) Debiao He et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- Internet of Things in Industries: A Survey
- (2014) Li Da Xu et al. IEEE Transactions on Industrial Informatics
- Universally composable one-time signature and broadcast authentication
- (2010) JunWei Zhang et al. Science China-Information Sciences
- Provably secure RSA-type signature based on conic curve
- (2008) Xiaolei Dong et al. WIRELESS COMMUNICATIONS & MOBILE COMPUTING
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started