[1] |
ZIMMERMAN T G . Personal area networks:near-field intra body communications[J]. IBM System Journal, 1996,35(3/4): 609-617.
|
[2] |
LAMPORT L . Password authentication with insecure communication[J]. Communications of the ACM, 1981,24(24): 770-772.
|
[3] |
LI M , YU S , LOU W ,et al. Group device pairing based secure sensor association and key management for body area networks[C]// Conference on Information Communications. 2010: 2651-2659.
|
[4] |
LI M , YU S , GUTTMAN J D ,et al. Secure ad hoc trust initialization and key management in wireless body area networks[J]. ACM Transactions on Sensor Networks, 2013,9(2): 1-35.
|
[5] |
YANG J H , CHANG C C . An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem[J]. Computer Security, 2009,28(3-4): 138-143.
|
[6] |
HE D , CHEN J , HU J . An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security[J]. Information Fusion, 2012,13(3): 223-230.
|
[7] |
HE D , ZEADALLY S , KUMAR N ,et al. Anonymous authentication for wireless body area networks with provable security[J]. IEEE System Journal, 2016,(99): 1-12.
|
[8] |
SHAMIR A . Identity-based cryptosystems and signature schemes[M]// Advances in Cryptology (Lecture Notes in Computer Science). Springer-Verlag, 1984,196: 47-53.
|
[9] |
Al-RIYAMI S S , PATERSON K G . Certificateless public key cryptography[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2003: 452-473.
|
[10] |
LIU J , ZHANG Z , SUN R ,et al. An efficient certificateless remote anonymous authentication scheme for wireless body area networks[C]// IEEE International Conference on Communications. 2012: 3404-3408.
|
[11] |
LIU J , ZHANG Z , CHEN X ,et al. Certificateless remote anonymous authentication schemes for wireless body area networks[J]. IEEE Transactions on Parallel & Distributed Systems, 2014,25(2): 332-342.
|
[12] |
XIONG H . Cost-effective scalable and anonymous certificateless remote authentication protocol[J]. IEEE Transactions on Information Forensics & Security, 2014,9(12): 2327-2339.
|
[13] |
XIONG H , QIN Z . Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks[J]. IEEE Transactions on Information Forensics & Security, 2015,10(7): 1442-1455.
|
[14] |
SEO J H , EMURA K . Revocable identity-based cryptosystem revisited:security models and constructions[M]. IEEE Press, 2014.
|
[15] |
TSAI T T , TSENG Y M . Revocable certificateless public key encryption[J]. IEEE Systems Journal, 2015,9(3): 824-833.
|
[16] |
CILARDO A , COPPOLINO L , MAZZOCCA N ,et al. Elliptic curve cryptography engineering[J]. Proceedings of the IEEE, 2006,94(2): 395-406.
|
[17] |
BELLARE M , NEVEN G . Multi-signatures in the plain public-key model and a general forking lemma[C]// ACM Conference on Computer and Communications Security. 2006: 390-399.
|
[18] |
CARO A D , IOVINO V . jPBC:Java pairing based cryptography[C]// Computers and Communications. 2011: 850-855.
|
[19] |
CHATTERJEE S , DAS A , SING J . An enhanced access control scheme in wireless sensor networks[J]. Ad-Hoc Sensor Wireless Network, 2014,21(1-2): 121-149.
|