A review on the state-of-the-art privacy-preserving approaches in the e-health clouds

A Abbas, SU Khan - IEEE journal of Biomedical and health …, 2014 - ieeexplore.ieee.org
Cloud computing is emerging as a new computing paradigm in the healthcare sector
besides other business domains. Large numbers of health organizations have started …

A threshold anonymous authentication protocol for VANETs

J Shao, X Lin, R Lu, C Zuo - IEEE Transactions on vehicular …, 2015 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) have recently received significant attention in
improving traffic safety and efficiency. However, communication trust and user privacy still …

A performance evaluation of local descriptors

K Mikolajczyk, C Schmid - IEEE transactions on pattern …, 2005 - ieeexplore.ieee.org
In this paper, we compare the performance of descriptors computed for local interest
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …

Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation

DA Rivas, JM Barceló-Ordinas, MG Zapata… - Journal of Network and …, 2011 - Elsevier
This article is a position paper on the current security issues in Vehicular Ad hoc Networks
(VANETs). VANETs face many interesting research challenges in multiple areas, from …

Short group signatures

D Boneh, X Boyen, H Shacham - Annual international cryptology …, 2004 - Springer
We construct a short group signature scheme. Signatures in our scheme are approximately
the size of a standard RSA signature with the same security. Security of our group signature …

An efficient system for non-transferable anonymous credentials with optional anonymity revocation

J Camenisch, A Lysyanskaya - International conference on the theory and …, 2001 - Springer
A credential system is a system in which users can obtain credentials from organizations
and demonstrate possession of these credentials. Such a system is anonymous when …

HDMA: Hybrid D2D message authentication scheme for 5G-enabled VANETs

P Wang, CM Chen, S Kumari… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The fifth-generation (5G) mobile communication technology with higher capacity and data
rate, ultra-low device to device (D2D) latency, and massive device connectivity will greatly …

Signature schemes and anonymous credentials from bilinear maps

J Camenisch, A Lysyanskaya - Annual international cryptology conference, 2004 - Springer
We propose a new and efficient signature scheme that is provably secure in the plain model.
The security of our scheme is based on a discrete-logarithm-based assumption put forth by …

Dynamic accumulators and application to efficient revocation of anonymous credentials

J Camenisch, A Lysyanskaya - … Santa Barbara, California, USA, August 18 …, 2002 - Springer
We introduce the notion of a dynamic accumulator. An accumulator scheme allows one to
hash a large set of inputs into one short value, such that there is a short proof that a given …

Direct anonymous attestation

E Brickell, J Camenisch, L Chen - … of the 11th ACM conference on …, 2004 - dl.acm.org
This paper describes the direct anonymous attestation scheme (DAA). This scheme was
adopted by the Trusted Computing Group (TCG) as the method for remote authentication of …