1 |
G. Kim, and M. Park, "A Study on the Methods of Fault Analysis to Improve Safety in U-Healthcare System for Managing Emergency Rescue for Seniors," Journal of Korea Multimedia Society, Vol. 17, No. 2, pp. 170-179, 2014.
DOI
|
2 |
H.M. Chen, J.W. Lo, and C.K. Yeh, "An Efficient and Secure Dynamic ID-Based Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 36, No. 6, pp. 3907-3915, 2012.
DOI
|
3 |
T. Cao, and J. Zhai, "Improved Dynamic IDBased Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 37, No. 2, pp. 1-7, 2013.
|
4 |
Q. Jiang, J. Ma, Z. Ma, and G. Li, "A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 37, No. 1, pp. 1-8, 2013.
|
5 |
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems," IEEE Journal on Selected Areas in Communications, Vol. 27, No. 4, pp. 365-378, 2009.
DOI
|
6 |
H. Yang, H. Kim, and K. Mtonga, "An Efficient Privacy-Preserving Authentication Scheme with Adaptive Key Evolution in Remote Health Monitoring System," Peer-to-Peer Networking and Applications, Vol. 8, No. 6, pp. 1059-1069, 2014.
|
7 |
P. Gopal, and P.V. Reddy, "Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curve," Journal of Discrete Mathematical Sciences and Cryptography, Vol. 18, No. 4, pp. 385-402, 2015.
DOI
|
8 |
D. Boneh, and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proceeding of Advances in Cryptology-CRYPTO 2001, pp. 213-229, 2001.
|
9 |
J.C. Choon and J.H. Cheon, "An Identity-Based Signature from Gap Diffie-Hellman Groups," Proceeding of Public Key Cryptography-PKC 2003, pp. 18-30, 2003.
|
10 |
K.S. Kwak, S. Ullah, and N. Ullah, "An Overview of IEEE 802.15.6 Standard," Proceeding of IEEE International Symposium on Applied Sciences in Biomedical and Communication Technologies, pp. 1-6, 2010.
|
11 |
The Pairing-Based Cryptography Library, https://crypto.stanford.edu/pbc/ (accessed Dec., 26, 2016).
|
12 |
R. Dupont and A. Enge, "Provably Secure Non-Interactive Key Distribution Based on Pairings," Discrete Applied Mathematics, Vol. 154, No. 2, pp. 270-276, 2006.
DOI
|
13 |
J. Weng, S. Liu, K. Chen, and X. Li, "Identity-Based Key-Insulated Signature with Secure Key-Updates," Proceeding of Information Security and Cryptology-Inscrypt 2006, pp. 13-26, 2006.
|
14 |
A. De Caro, and V. Iovino, "jPBC: Java Pairing Based Cryptography," Proceedings of the 16th IEEE Symposium on Computers and Communications, pp. 850-855, 2011.
|