2018
DOI: 10.1016/j.jnca.2018.09.005
|View full text |Cite
|
Sign up to set email alerts
|

Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
48
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 70 publications
(48 citation statements)
references
References 35 publications
0
48
0
Order By: Relevance
“…In 2012, Tso et al [11] proposed a strong secure certificateless short signature, which is more suitable for low bandwidth channels and/or low computing power systems requiring higher security levels. In 2018, Jia et al [29] and Zhang et al [30] put forward their certificateless signature schemes respectively. Besides, some medical application schemes were proposed.…”
Section: Related Work a Certificateless Signaturementioning
confidence: 99%
“…In 2012, Tso et al [11] proposed a strong secure certificateless short signature, which is more suitable for low bandwidth channels and/or low computing power systems requiring higher security levels. In 2018, Jia et al [29] and Zhang et al [30] put forward their certificateless signature schemes respectively. Besides, some medical application schemes were proposed.…”
Section: Related Work a Certificateless Signaturementioning
confidence: 99%
“…Therefore, a robust authentication scheme securing this communication is essential. Recently, a lot of works have been conducted to address security and privacy for sensitive information distributed using IoT devices in mobility networks or edge computing networks [11]- [15].…”
Section: Introductionmentioning
confidence: 99%
“…Different from backbone networks, with the main purpose of providing reachability services, enterprise networks need to support much more fine-grained routing policies. For example, 1) Multi-homing: an enterprise should be able to deliver the traffic of IPTV users to one upstream ISP, and the traffic of VoIP users to another upstream ISP; 2) Access control: a hospital needs to implement strict access control to gurantee the security of patients' electronic records [5]; 3) Performance: a bank should choose secure paths for its bank applications, and low-latency paths for its financial applications [6]. Other examples in enerprise networks include load balancing, network virtualization, etc.…”
Section: Introductionmentioning
confidence: 99%