With the application of sensor technology in the field of healthcare, online data sharing in healthcare industry attracts more and more attention since it has many advantages, such as high efficiency, low latency, breaking the geographical location, and time constraints. However, due to the direct involvement of patient health information, the privacy and integrity of medical data have become a matter of much concern to the healthcare industry. To retain data privacy and integrity, a number of digital signature schemes have been introduced in recent years. Unfortunately, most of them suffer serious security attacks and do not perform well in terms of computation overhead and communication overhead. Very recently, Pankaj Kumar et al. propose...
The Internet of Health Things (IoHT) is an extended breed of the Internet of Things (IoT), which pla...
With the widespread growth of cloud computing and mobile healthcare crowd sensing (MHCS), an increas...
The recent spades of cyber-attacks have compromised patients’ data security and privacy in healthcar...
In healthcare wireless medical sensor networks (HWMSNs), the medical sensor nodes are employed to co...
Certificateless cryptography resolves the certificate management problem of public-key cryptography ...
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct mess...
In this study, we propose an efficient aggregate signcryption scheme to maximize the security of dat...
An aggregate signature scheme allows a public algorithm to aggregate n signatures on n distinct mess...
We stretch an ID-based aggregate signature (IBAS) scheme for WSNs in cluster-based method . The oppo...
[[abstract]]In ubiquitous computing, data should be able to be accessed from any location, and the c...
In tangible, the wireless sensor networks have been approximately practical, such as target tracking...
In recent years, with the increase in degenerative diseases and the aging population in advanced cou...
In this study, we propose an efficient aggregate signcryption scheme to maximize the security of dat...
Thanks to recent advancements in biomedical sensors, wireless networking technologies, and informati...
International audience—There has been a host of research works on wireless sensor networks (WSN) for...
The Internet of Health Things (IoHT) is an extended breed of the Internet of Things (IoT), which pla...
With the widespread growth of cloud computing and mobile healthcare crowd sensing (MHCS), an increas...
The recent spades of cyber-attacks have compromised patients’ data security and privacy in healthcar...
In healthcare wireless medical sensor networks (HWMSNs), the medical sensor nodes are employed to co...
Certificateless cryptography resolves the certificate management problem of public-key cryptography ...
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct mess...
In this study, we propose an efficient aggregate signcryption scheme to maximize the security of dat...
An aggregate signature scheme allows a public algorithm to aggregate n signatures on n distinct mess...
We stretch an ID-based aggregate signature (IBAS) scheme for WSNs in cluster-based method . The oppo...
[[abstract]]In ubiquitous computing, data should be able to be accessed from any location, and the c...
In tangible, the wireless sensor networks have been approximately practical, such as target tracking...
In recent years, with the increase in degenerative diseases and the aging population in advanced cou...
In this study, we propose an efficient aggregate signcryption scheme to maximize the security of dat...
Thanks to recent advancements in biomedical sensors, wireless networking technologies, and informati...
International audience—There has been a host of research works on wireless sensor networks (WSN) for...
The Internet of Health Things (IoHT) is an extended breed of the Internet of Things (IoT), which pla...
With the widespread growth of cloud computing and mobile healthcare crowd sensing (MHCS), an increas...
The recent spades of cyber-attacks have compromised patients’ data security and privacy in healthcar...