1 |
JABEEN T, ASHRAF H, ULLAH A. A survey on healthcare data security in wireless body area networks[J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12(10): 9841-9854.
|
2 |
宫继兵, 王睿, 崔莉. 体域网BSN的研究进展及面临的挑战[J]. 计算机研究与发展, 2010, 47(5): 737-753.
|
|
GONG J B, WANG R, CUI L. Research advances and challenges of body sensor network(BSN)[J]. Journal of Computer Research and Development, 2010, 47(5): 737-753. (in Chinese)
|
3 |
MYKLETUN E, GIRAO J, WESTHOFF D. Public key based cryptoschemes for data concealment in wireless sensor networks[C]//2006 IEEE International Conference on Communications. Istanbul: IEEE, 2006: 2288-2295.
|
4 |
张文娟, 吴聪, 余梅生. 利用多值和模糊属性的云辅助WBAN数据加密算法[J]. 计算机应用研究, 2016, 33(5): 1537-1541.
|
|
ZHANG W J, WU C, YU M S. Data encryption algorithm of cloud-assisted WBAN using multi-valued and ambiguous attribute[J]. Application Research of Computers, 2016, 33(5): 1537-1541. (in Chinese)
|
5 |
MANA M, FEHAM M, BENSABER B A. Trust key management scheme for wireless body area networks[J]. International Journal of Network Security, 2011, 12(2): 75-83.
|
6 |
TRIPATHY S. Tin-key: Effective key-establishment for wireless sensor networks[C]//2010 10th IEEE International Conference on Computer and Information Technology. Bradford: IEEE, 2010: 916-921.
|
7 |
张维纬, 张育钊, 黄焯, 等. 支持安全外包计算的无线体域网数据共享方案[J]. 通信学报, 2017, 38(4): 64-75.
|
|
ZHANG W W, ZHANG Y Z, HUANG Z, et al. Data sharing scheme supporting secure outsourced computation in wireless body area network[J]. Journal on Communications, 2017, 38(4): 64-75. (in Chinese)
|
8 |
高改梅, 彭新光, 靳黎忠. 面向云辅助WBAN的无证书公共审计方案[J]. 计算机工程与设计, 2019, 40(2): 306-311.
|
|
GAO G M, PENG X G, JIN L Z. Certificateless public auditing scheme for cloud-assisted WBAN[J]. Computer Engineering and Design, 2019, 40(2): 306-311. (in Chinese)
|
9 |
MUKHTAR T, CHAUDHARY S. Energy efficient cluster formation and secure data outsourcing using TEOSCC and ECDH-IBT technique in WBAN[C]//2016 International Conference on Wireless Communications, Signal Processing and Networking(WiSPNET). Chennai: IEEE, 2016: 596-602.
|
10 |
ZHENG Y L. Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost(encryption)[C]//Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer, 1997: 165-179.
|
11 |
CAGALABAN G, KIM S. Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption[C]//Proceedings of the 13th International Conference on Advanced Communication Technology. Gangwon: IEEE, 2011: 863-867.
|
12 |
LI F G, HONG J J. Efficient certificateless access control for wireless body area networks[J]. IEEE Sensors Journal, 2016, 16(13): 5389-5396.
|
13 |
ULLAH I, ZEADALLY S, AMIN N U, et al. Lightweight and provable secure cross-domain access control scheme for Internet of Things(IoT) based wireless body area networks(WBAN)[J]. Microprocessors and Microsystems, 2021, 81: 103477.
|
14 |
OMALA A A, MBANDU A S, MUTIRIA K D, et al. Provably secure heterogeneous access control scheme for wireless body area network[J]. Journal of Medical Systems, 2018, 42(6): 108.
|
15 |
ZHANG J. Public key encryption with keyword search in wireless body area network[J]. Modern Computer, 2017, 12(1): 64-73.
|
16 |
RAMADAN M, LIAO Y J, LI F G, et al. IBEET-RSA: Identity-based encryption with equality test over RSA for wireless body area networks[J].Mobile Networks and Applications, 2020, 25(1): 223-233.
|
17 |
XIONG H, HOU Y Z, HUANG X, et al. Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs[J]. IEEE Systems Journal, 2021, DOI:10.1109/JSYST.2020.3048972 .
|
18 |
BAO F, DENG R H, ZHU H F. Variations of Diffie-Hellman Problem[C]//International Conference on Information and Communications Security. Berlin: Springer, 2003: 301-312.
|
19 |
NAKAMOTO S. Bitcoin: A Peer-to-Peer Electronic Cash System[EB/OL]. (2009)[2021]. .
|
20 |
朱健, 胡凯, 张伯钧. 智能合约的形式化验证方法研究综述[J]. 电子学报, 2021, 49(4): 792-804.
|
|
ZHU J, HU K, ZHANG B J. Review on formal verification of smart contract[J]. Acta Electronica Sinica, 2021, 49(4): 792-804. (in Chinese)
|
21 |
CHEN B W, HE D B, KUMAR N, et al. A blockchain-based proxy re-encryption with equality test for vehicular communication systems[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(3): 2048-2059.
|
22 |
CHEN B W, WU L B, WANG H Q, et al. A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks[J]. IEEE Transactions on Vehicular Technology, 2020, 69(6): 5813-5825.
|
23 |
BONOMI F, MILITO R, ZHU J, et al. Fog computing and its role in the Internet of Things[C]//Proceedings of the first edition of the MCC workshop on Mobile cloud computing. 2012: 13-16.
|
24 |
QU H P, YAN Z, LIN X J, et al. Certificateless public key encryption with equality test[J]. Information Sciences, 2018, 462: 76-92.
|
25 |
WANG L L, CHEN K F, MAO X P, et al. Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing[J].Journal of Shanghai Jiaotong University(Science), 2014, 19(4): 398-405.
|
26 |
张艳艳, 王亮亮. 新型的基于DLP的无证书签名方案[J]. 计算机工程与应用, 2011, 47(12): 62-64.
|
|
ZHANG Y Y, WANG L L. New DLP-based certificateless signature scheme[J]. Computer Engineering and Applications, 2011, 47(12): 62-64. (in Chinese)
|
27 |
HAFIZUL ISLAM S, LI F G. Leakage-free and provably secure certificateless signcryption scheme using bilinear pairings[J]. The Computer Journal, 2015, 58(10): 2636-2648.
|
28 |
HU Q, YAN B W, HAN Y B, et al. An improved delegated proof of stake consensus algorithm[J]. Procedia Computer Science, 2021, 187: 341-346.
|
29 |
ZHANG E. Truechain: Highly Performant Decentralized Public Ledger Work in Progress[EB/OL]. (2018)[2021]. .
|