版权说明 操作指南
首页 > 成果 > 详情

Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Guo, Yimin;Zhang, Zhenfeng;Guo, Yajun
通讯作者:
Guo, Y.
作者机构:
[Guo, Yimin; Zhang, Zhenfeng] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing 100864, Peoples R China.
[Guo, Yimin; Zhang, Zhenfeng] Univ Chinese Acad Sci, Beijing 100049, Peoples R China.
[Guo, Yimin] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Hubei, Peoples R China.
[Guo, Yajun] Cent China Normal Univ, Sch Comp, Wuhan 430079, Hubei, Peoples R China.
通讯机构:
[Guo, Y.] T
Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing, China
语种:
英文
关键词:
Wearable computers;Authentication;Protocols;Servers;Cloud computing;Biomedical monitoring;Public key cryptography;Authentication;group proof;key agreement;wearable computing
期刊:
IEEE TRANSACTIONS ON MOBILE COMPUTING
ISSN:
1536-1233
年:
2022
卷:
21
期:
8
页码:
2718-2731
基金类别:
National Key R&D Program of China (Grant Number: 2017YFB0802000) 10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 61802376) 10.13039/501100012226-Fundamental Research Funds for the Central Universities (Grant Number: CCNU19ZN008)
机构署名:
本校为其他机构
院系归属:
计算机学院
摘要:
Wearable computing has been used in a wide range of applications. But wearable computing often suffers from various security and privacy issues. To solve these issues, many effective authentication schemes have been proposed. However, most of the existing schemes are vulnerable to various known attacks (such as desynchronization attack, privileged-insider attack, and anonymity attack), or require high computation and communication costs, and are not suitable for resource-constrained wearable devices, or simultaneous verification of multiple wea...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com