[1] |
HUSSEIN M , FRANCIS M B . Optimal relay selection and power control with quality-of-service provisioning in wireless body area networks[J]. IEEE Transactions on Wireless Communications, 2016,15(8): 5497-5510.
|
[2] |
HU F Y , WANG L , WANG S S . A human body posture recognition algorithm based on BP neural network for wireless body area networks[J]. China Communications, 2016,13(8): 198-208.
|
[3] |
肖人毅 . 云计算中数据隐私保护研究进展[J]. 通信学报, 2014,35(12): 168-177.
|
|
XIAO R Y . Survey of privacy preserving data queries in cloud computing[J]. Journal on Communications, 2014,35(12): 168-177.
|
[4] |
董晓蕾 . 物联网隐私保护研究进展[J]. 计算机研究与发展, 2015,52(10): 2341-2351.
|
|
DONG X L . Advances of privacy preservation in internet of things[J]. Journal of Computer Research and Development, 2015,52(10): 2341-2351.
|
[5] |
LI M , LOU W , REN K . Data security and privacy in wireless body area networks[J]. IEEE Wireless Communications, 2010,17(1): 51-58.
|
[6] |
HU C Q , LI H J , HUO Y ,et al. Secure and efficient data communication protocol for wireless body area networks[J]. IEEE Transactions on Multi-Scale Computing Systems, 2016,2(2): 94-107.
|
[7] |
TIAN Y , PENG Y B , PENG X G ,et al. An attribute-based encryption scheme with revocation for fine-grained access control in wireless body area networks[J]. International Journal of Distributed Sensor Networks, 2014,10(11): 1-11.
|
[8] |
LIU X Y , ZHU Y S , GE Y ,et al. A secure medical information management system for wireless body area networks[J]. KSII Transactions on Internet and Information Systems, 2016,10(1): 221-237.
|
[9] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Eurocrypt 2005. Berlin:Heidelberg, 2005: 457-473.
|
[10] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The ACM 13th Conference on Computer and Communications Security. 2006: 89-98.
|
[11] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// 2007 IEEE Symposium on Security and Privacy. Berkeley,CA:IEEE, 2007: 321-334.
|
[12] |
WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient and provably secure realization[C]// PKC 2011. Berlin:Heidelberg, 2005: 53-70.
|
[13] |
YU S , REN K , LOU W . FDAC:Toward fine-grained distributed data access control in wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(4): 637-686.
|
[14] |
PICAZO-SANCHEZ P , TAPIADOR J E,PERIS-LOPEZ P ,et al. Secure publish-subscribe protocols for heterogeneous medical wireless body area networks[J]. Sensors, 2014,14(12): 22619-22642.
|
[15] |
GUO F , MU Y , SUSILO W ,et al. CP-ABE with constant-size keys for lightweight devices[J]. IEEE Transactions on Information Forensics and Security, 2014,9(5): 763-771.
|
[16] |
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts[C]// USENIX Security Symposium. Berkeley,CA:USENIX, 2011: 523-538.
|
[17] |
ASIM M , PETKOVIC M , IGNATENKO T . Attribute-based encryption with encryption and decryption outsourcing[C]// The 12th Australian Information Security Management Conference,Perth,Western Australia,Austria:Edith Cowan University, 2014: 21-28.
|
[18] |
ZHOU Z B , HUANG D J . Efficient and secure data storage operations for mobile cloud computing[C]// The 8th International Conference on Network and Service Management,Laxenburg,Austria:International Federation for Information Processing. 2012: 37-45.
|
[19] |
ZHOU S G , DU R Y , CHEN J ,et al. FACOR:flexible access control with outsourceable revocation in mobile clouds[J]. China Communications, 2016,13(4): 136-150.
|
[20] |
SHOUP V , . Lower bounds for discrete logarithms and related problems[C]// Eurocrypt'97. 1997: 256-266.
|
[21] |
MAURER U , . Abstract models of computation in cryptography[C]// Cryptography and Coding 2005. 2005: 1-12.
|
[22] |
BONEH D , FRANKLIN M . Identity-based encryption from the weil paring[C]// CRYPTO 2001. Berlin:Heidelberg, 2001: 213-229.
|
[23] |
BEIMEL A . Secure schemes for secret sharing and key distribution[D]. Haifa:Israel Institute of Technology, 1996.
|