Abi-Char, P. E., Mhamed, A., and El-Hassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), pp. 235–240 (2007). doi:10.1109/NGMAST.2007.4343427
Akyildiz, I. F., and Su, W., Sankarasubramaniam, Y., Cayirci, E., A survey on sensor networks. IEEE Commun. Mag. 40(8):102–114, 2002. doi:10.1109/MCOM.2002.1024422.
Al-Riyami, S. S., and Paterson, K. G., Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings, chap. Certificateless Public Key Cryptography, pp. 452–473. Berlin: Springer, 2003. doi:10.1007/978-3-540-40061-5_29.
Aydos, M., Sunar, B., and Koc, C. K., An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998)
Bourouis, A., Feham, M., and Bouchachia, A., Ubiquitous mobile health monitoring system for elderly (UMHMSE). arXiv:1107.3695 (2011)
Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., and Leung, V. C. M., Body area networks: a survey. Mobile Netw. Appl. 16(2):171–193, 2010. doi:10.1007/s11036-010-0260-8.
Cherukuri, S., Venkatasubramanian, K. K., and Gupta, S. K. S., Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of the 2003 International Conference on Parallel Processing Workshops, 2003, pp. 432–439 (2003). doi:10.1109/ICPPW.2003.1240399
Dolev, D., and Yao, A. C., On the security of public key protocols. In: 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pp. 350–357 (1981). doi:10.1109/SFCS.1981.32
Hankerson, D., Menezes, A. J., and Vanstone, S., Guide to elliptic curve cryptography. Springer Science & Business Media (2006)
He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. PP(99):1–12, 2016. doi:10.1109/JSYST.2016.2544805.
Hu, B. C., Wong, D. S., Zhang, Z., and Deng, X., Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings, chap. Key Replacement Attack Against a Generic Construction of Certificateless Signature, pp. 235–246. Springer, Berlin, Heidelberg (2006). doi:10.1007/11780656_20
Islam, S. H., Design and analysis of an improved smartcard-based remote user password authentication scheme. Int. J. Commun. Syst. 29(11):1708–1719, 2016. doi:10.1002/dac.2793.
Islam, S. H., and Khan, M. K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014. doi:10.1007/s10916-014-0135-9.
Islam, S. H., Obaidat, M. S., and Amin, R., An anonymous and provably secure authentication scheme for mobile user. Int. J. Commun. Syst. 29(9):1529–1544, 2016. doi:10.1002/dac.3126. Dac.3126.
Jiang, C., Li, B., and Xu, H., An efficient scheme for user authentication in wireless sensor networks. In: 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, AINAW ’07. Vol. 1, pp. 438–442 (2007), 10.1109/AINAW.2007.80
Kim, J. S., and Chung, J. Y., Eeg encryption scheme with junk data using chaos maps. In: 2015 6th International Conference on Intelligent Systems, Modelling and Simulation, pp. 132–134 (2015). doi:10.1109/ISMS.2015.25
Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48(177):203–209, 1987.
Article
Google Scholar
Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P., A survey on wireless body area networks. Wirel. Netw. 17(1):1–18, 2011. doi:10.1007/s11276-010-0252-4.
Li, F., Han, Y., and Jin, C., Practical access control for sensor networks in the context of the internet of things. Comput. Commun. 89-90:154–164, 2016. doi:10.1016/j.comcom.2016.03.007. http://www.sciencedirect.com/science/article/pii/S0140366416300652. Internet of Things Research challenges and Solutions.
Li, F., Zheng, Z., and Jin, C., Secure and efficient data transmission in the internet of things. Telecommun. Syst. 62(1):111–122, 2016. doi:10.1007/s11235-015-0065-y.
Liu, J., Zhang, Z., Chen, X., and Kwak, K. S., Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25 (2): 332–342, 2014. doi:10.1109/TPDS.2013.145.
Liu, J., Zhang, Z., Sun, R., and Kwak, K. S., An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 3404–3408 (2012). doi:10.1109/ICC.2012.6363786
Miller, V. S., Use of elliptic curves in cryptography. In: Advances in Cryptology—CRYPTO’85 Proceedings, pp. 417–426. Springer (1985)
Omala, A. A., Robert, N., and Li, F., A provably-secure transmission scheme for wireless body area networks. J. Med. Syst. 40(11):247, 2016. doi:10.1007/s10916-016-0615-1.
Reddy, A. G., Das, A. K., Yoon, E. J., and Yoo, K. Y., A secure anonymous authentication protocol for mobile services on elliptic curve cryptography. IEEE Access 4:4394–4407, 2016. doi:10.1109/ACCESS.2016.2596292.
Shamir, A., Advances in cryptology. In: Proceedings of CRYPTO 84, chap. Identity-Based Cryptosystems and Signature Schemes, pp. 47–53. Springer, Berlin. doi:10.1007/3-540-39568-7_5 (1985)
Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39(11):1–8, 2015. doi:10.1007/s10916-015-0331-2.
Wang, D., He, D., Wang, P., and Chu, C. H., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4):428–442, 2015. doi:10.1109/TDSC.2014.2355850.
Xiong, H., Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9(12):2327–2339, 2014. doi:10.1109/TIFS.2014.2363553.
Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014. doi:10.1007/s10916-014-0013-5.