2018
DOI: 10.1109/access.2018.2799007
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 51 publications
(12 citation statements)
references
References 21 publications
0
12
0
Order By: Relevance
“…is scheme uses hierarchical ID tree to define the ID values of users, cloud service providers, and other entities to realize the uniqueness of entity identity. Compared with literature [34][35][36][37][38][39], this scheme replaces the real identity with the temporary identity, and the KGC or CA1 signs user U's temporary identity, further enhancing security and meanwhile realizing anonymous tracking. Compared with literature [33][34][35][36], the KGC or CA1 in this scheme signs the temporary identity of user U and encrypts the message by the public key of the CSP, which results in better performance in resisting man-in-the-middle attacks.…”
Section: Anti-man-in-the-middle Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…is scheme uses hierarchical ID tree to define the ID values of users, cloud service providers, and other entities to realize the uniqueness of entity identity. Compared with literature [34][35][36][37][38][39], this scheme replaces the real identity with the temporary identity, and the KGC or CA1 signs user U's temporary identity, further enhancing security and meanwhile realizing anonymous tracking. Compared with literature [33][34][35][36], the KGC or CA1 in this scheme signs the temporary identity of user U and encrypts the message by the public key of the CSP, which results in better performance in resisting man-in-the-middle attacks.…”
Section: Anti-man-in-the-middle Attacksmentioning
confidence: 99%
“…Compared with literature [34][35][36][37][38][39], this scheme replaces the real identity with the temporary identity, and the KGC or CA1 signs user U's temporary identity, further enhancing security and meanwhile realizing anonymous tracking. Compared with literature [33][34][35][36], the KGC or CA1 in this scheme signs the temporary identity of user U and encrypts the message by the public key of the CSP, which results in better performance in resisting man-in-the-middle attacks. Compared with literature [34,36], this scheme randomly selects the local timestamp and random parameters for keeping the session fresh to ensure the validity of the message in crossdomain authentication, which realizes the resistance of the replay attack.…”
Section: Anti-man-in-the-middle Attacksmentioning
confidence: 99%
“…However, many attack technologies are emerging, including white box attacks, gray box attacks, black box attacks, and improvements to these attacks [15]- [18]. In addition, there are many models and emerging technologies that apply to network security [19]- [23]. Security situation prediction has become an effective method for protecting network security, and has previously been applied in sensor networks [24]- [30] and other mobile networks [31], [32].…”
Section: Related Workmentioning
confidence: 99%
“…A dynamic and cross-domain authenticated asymmetric group key agreement is proposed in [25]. This protocol adopts cross-domain authentication mechanism to avoid the security risks of key escrow and the complexity of certificate management.…”
Section: A Related Workmentioning
confidence: 99%