scispace - formally typeset
Journal ArticleDOI

Context-aware access control and anonymous authentication in WBAN

TLDR
This paper proposes a context-aware access control and anonymous authentication approach based on a secure and efficient Hybrid Certificateless Signcryption (H-CLSC) scheme that incorporates the merits of Ciphertext-Policy Attribute-Based Signcrypted and Identity-Based Broadcast Signc encryption in order to meet the security requirements and provide adaptive contextual privacy.
About
This article is published in Computers & Security.The article was published on 2020-01-01. It has received 26 citations till now. The article focuses on the topics: Signcryption & Access control.

read more

Citations
More filters
Journal ArticleDOI

Secure and Efficient Data Aggregation for IoT Monitoring Systems

TL;DR: A novel cryptographic accumulator based on the novel authenticated additive homomorphic encryption which can collect and accumulate data from IoT wireless wearable devices and can be used for analysis in an encrypted form so that the information is not revealed.
Journal ArticleDOI

PAASH: A privacy-preserving authentication and fine-grained access control of outsourced data for secure smart health in smart cities

TL;DR: An analysis of PAASH reveals that it can provide desirable privacy and security measures in smart health and the formal security demonstrated in the random oracle model (ROM) shows that PAASH is semantically secure under the intractability of the Discrete Logarithm Problem (DLP).
Journal ArticleDOI

Context-based Co-presence detection techniques: A survey

TL;DR: A systematic survey on the contextual information based proximity detection techniques, commonly referred as Contextual Co-presence (COCO) protocols, which includes a discussion on the possible adversary and communication models along with the existing security attacks on ZICDA systems.
Journal ArticleDOI

SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks

TL;DR: A secure and anonymous mutual authentication scheme for WBANs (SAMAKA) is propounded that preserves all the desired security features and guards from various security attacks from an adversary and is proved to be provably secure in the RoR Model.
Proceedings ArticleDOI

A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud

TL;DR: The concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system offers a high-security guarantee and high efficiency.
References
More filters
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Journal ArticleDOI

Wireless Body Area Networks: A Survey

TL;DR: The current state-of-art of WBANs is surveyed based on the latest standards and publications, and open issues and challenges within each area are explored as a source of inspiration towards future developments inWBANs.
Journal ArticleDOI

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

TL;DR: A novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers are proposed and a high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE.
Journal ArticleDOI

EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications

TL;DR: This paper proposes an efficient and privacy-preserving aggregation scheme, named EPPA, for smart grid communications that resists various security threats and preserve user privacy, and has significantly less computation and communication overhead than existing competing approaches.
Related Papers (5)