Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 537-543.doi: 10.11896/jsjkx.220200139
• Information Security • Previous Articles Next Articles
CHEN Yan-bing1, ZHONG Chao-ran1, ZHOU Chao-ran1, XUE Ling-yan1, HUANG Hai-ping1,2
CLC Number:
[1] FENG J Y,WANG T,YU T T.A Secure Medical Data Sharing Scheme Based on Multi-clouds and Multi-chains Collaboration[J].Netinfo Security,2022,22(1):9-18. [2] YUAN C,ZHANG W F.EIMAKP:Heterogeneous cross do-main authenticated key agreement protocols in the EIM system[J].Arabian Journal for Science and Engineering,2017,42(8):3275-3287. [3] ZHANG W,WANG X,KHAN M K.A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems[J].Security and Communication Networks.2015,8(6):937-951. [4] DONG G,CHEN Y,FAN J,et al.Anonymous cross-domain authentication scheme for medical PKI system[C]//Anonymous cross-domain authentication scheme for medical PKI system.Proceedings of the ACM Turing Celebration Conference- China on- ACM TURC '19.1-7. [5] SHEN M,LIU H,ZHU L,et al.Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT[J].IEEE Journal on Selected Areas in Communications,2020,PP(99):1-1. [6] YUAN C,ZHANG W,WANG X.EIMAKP:HeterogeneousCross-Domain Authenticated Key Agreement Protocols in the EIM System[J].Arabian Journal for Science and Engineering,2017,42(8):3275-3287. [7] LIEBEHERR J,DONG G.An overlay approach to data security in ad-hoc networks[J].Ad Hoc Networks,2007,5(7):1055-1072. [8] SUN Y,YU Y,LI X,et al.Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations[C]//Australasian Conference on Information Security and Privacy.2016:293-309. [9] ZHOU Z C,LI L S,LI Z H.Efficient cross-domain authentication scheme based on blockchain technology[J].Journal of Computer Applications,2018,38(2):316-320. [10] WANG W,HU N,LIU X.BlockCAM:A Blockchain-BasedCross-Domain Authentication Model[C]//2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).IEEE,China,Guangzhou:2018:896-901. [11] MA X T,MA W P,LIU X X.A Cross Domain Authentication Scheme Based on Blockchain Technology[J].Acta Electronica Sinica,2018,46(11):2571-2579. [12] JIA X,HU N,SU S,et al.IRBA:An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things[J].Electronics,2020,9(4):634. [13] LI G,WANG Y,ZHANG B,et al.Smart Contract-BasedCross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks[J].Mobile Information Systems,2020(29):1-16. [14] BENJAMIN K,ANTHONY P,DZISOOP M.Heterogeneousidentity-based to certificateless online/offline signcryption[J].IJISET-International Journal of Innovative Science,Engineering &Technology,2015,2(12):472-484. [15] LI Y,CHEN W,CAI Z,et al.CAKA:a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks[J].Wireless Networks,2016,22(8):2523-2535. [16] AMIN S U,HOSSAIN M S,MUHAMMAD G,et al.Cognitive Smart Healthcare for Pathology Detection and Monitoring[J].IEEE Access,2019,7:10745-1753. [17] HOSSAIN M S,MUHAMMAD G.Emotion-Aware Connected Healthcare Big Data Towards 5G[J].Internet of Things Journal,IEEE,2018,5(4):2399-2406. [18] LIU X,MA W.CDAKA:A Provably-Secure HeterogeneousCross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS[J].Journal of Medical Systems,2018,42(8):135. [19] ALI A,RAHIM H A,ALI J,et al.A Novel Secure Blockchain Framework for Accessing Electronic Health Records Using Multiple Certificate Authority[J].Applied Sciences,2021,11(21):9999. [20] DIFFIE W.New Direction in Cryptography[J].IEEE trans.In-form.Theory,1976,22:644-654. [21] DOUCEUR J R.The sybil attack[C]//International Workshop on Peer-to-Peer Systems.Springer,Berlin,Heidelberg,2002:251-260. [22] NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash Sys-tem[J/OL].https://mronline.org/wp-content/uploads/2018/06/bitcoin.pdf. |
[1] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[2] | JIANG Ze-tao, XU Juan-juan. Efficient Heterogeneous Cross-domain Authentication Scheme Based on Proxy Blind Signature in Cloud Environment [J]. Computer Science, 2020, 47(11): 60-67. |
[3] | ZHOU Wan-kai, LONG Min. Secure Transmission Scheme for Environmental Monitoring Data Based on Blockchain [J]. Computer Science, 2020, 47(1): 315-320. |
|