References
- G. Kim, and M. Park, "A Study on the Methods of Fault Analysis to Improve Safety in U-Healthcare System for Managing Emergency Rescue for Seniors," Journal of Korea Multimedia Society, Vol. 17, No. 2, pp. 170-179, 2014. https://doi.org/10.9717/kmms.2014.17.2.170
- K.S. Kwak, S. Ullah, and N. Ullah, "An Overview of IEEE 802.15.6 Standard," Proceeding of IEEE International Symposium on Applied Sciences in Biomedical and Communication Technologies, pp. 1-6, 2010.
- H.M. Chen, J.W. Lo, and C.K. Yeh, "An Efficient and Secure Dynamic ID-Based Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 36, No. 6, pp. 3907-3915, 2012. https://doi.org/10.1007/s10916-012-9862-y
- T. Cao, and J. Zhai, "Improved Dynamic IDBased Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 37, No. 2, pp. 1-7, 2013.
- Q. Jiang, J. Ma, Z. Ma, and G. Li, "A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 37, No. 1, pp. 1-8, 2013.
- X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems," IEEE Journal on Selected Areas in Communications, Vol. 27, No. 4, pp. 365-378, 2009. https://doi.org/10.1109/JSAC.2009.090502
- H. Yang, H. Kim, and K. Mtonga, "An Efficient Privacy-Preserving Authentication Scheme with Adaptive Key Evolution in Remote Health Monitoring System," Peer-to-Peer Networking and Applications, Vol. 8, No. 6, pp. 1059-1069, 2014.
- P. Gopal, and P.V. Reddy, "Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curve," Journal of Discrete Mathematical Sciences and Cryptography, Vol. 18, No. 4, pp. 385-402, 2015. https://doi.org/10.1080/09720529.2014.1001586
- D. Boneh, and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proceeding of Advances in Cryptology-CRYPTO 2001, pp. 213-229, 2001.
- J.C. Choon and J.H. Cheon, "An Identity-Based Signature from Gap Diffie-Hellman Groups," Proceeding of Public Key Cryptography-PKC 2003, pp. 18-30, 2003.
- R. Dupont and A. Enge, "Provably Secure Non-Interactive Key Distribution Based on Pairings," Discrete Applied Mathematics, Vol. 154, No. 2, pp. 270-276, 2006. https://doi.org/10.1016/j.dam.2005.03.024
- J. Weng, S. Liu, K. Chen, and X. Li, "Identity-Based Key-Insulated Signature with Secure Key-Updates," Proceeding of Information Security and Cryptology-Inscrypt 2006, pp. 13-26, 2006.
- A. De Caro, and V. Iovino, "jPBC: Java Pairing Based Cryptography," Proceedings of the 16th IEEE Symposium on Computers and Communications, pp. 850-855, 2011.
- The Pairing-Based Cryptography Library, https://crypto.stanford.edu/pbc/ (accessed Dec., 26, 2016).