- K.-T. Nguyen, M. Laurent, and N. Oualha, “Survey on secure communication protocols for the Internet of Things,” Ad-hoc Networks, pp.1-15, 2015.
- Gartner Inc., “Forecast: The Internet of Things,” Worldwide, 2013.
- E. Borgia, “The Internet of Things vision: Key features, Applications and open issues,” Computer Communications, pp. 1–31, 2014.
- J. Lu, T. Sookoor, V. Srinivasan, G. Gao, B. Holben, J. Stankovic, and E. Field, “Whitehouse, The smart thermostat: using occupancy sensors to save energy in homes,” in: Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys’10), pp. 211–224, 2010.
- C. Chen, D. J. Cook, and A. S. Crandall, “The user side of sustainability: modeling behavior and energy usage in the home,” Pervas. Mob. Comput., vol. 9, no. 1, pp. 161–175, 2013.
- S.-K. Jakobsson and R. Impagliazzo, “Designated verifier proofs and their applications,” In: Advances in Eurocrypt’96. LNCS, 1070. Springer-Verlag, pp. 143–54, 1996.
- S. Saeednia, S. Kramer, and O. Markovitch, “An efficient strong designated verifier signature scheme,” In: ICISC 2003, Berlin: Springer-Verlag, pp. 40–54, 2003.
- X. Huang, W. Susilo, Y. Mu, and F. Zhang, “Short designated verifier signature scheme and its identity-based variant,” International Journal of Network Security, vol. 6, no. 1, pp. 82–93, 2008.
- K. Kumar, G. Shailaja, and A. Saxena, “Identity based strong designated verifier signature scheme,” Cryptography eprint Archive Report 2006/134. Available at http://eprint.iacr.org/complete/2006/134.pdf.
- W. Susilo, F. Zhang, and Y. Mu, “Identity-based strong designated verifier signature schemes,” In: ACISP 2004, LNCS 3108, pp. 313–324, 2004.
- S. Lal and V. Verma, “Identity base strong designated verifier proxy signature schemes,” Cryptography eprint Archive Report, 2006. Available at: http://eprint.iacr.org/complete/2006/394.pdf.
- G. Chen and Sh. Wan, “Analysis and improvement of identity-based designated verifier signature scheme,” 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 2388–2391, 2012.
- J.-S. Lee, J.-H. Chang, and D.-H. Lee, “Forgery attacks on Kang et al.’s identity base strong designated verifier signature scheme and its improvement with security proof,” Computer & Electrical Engineering, 36 (2010), pp. 948-954, 2010.
- H. Lipma, G. Wang, and F. Bao, “Designated verifier signature schemes: attacks, new security notions and new construction,” In: ICALP 2005, LNCS 3580, Springer-Verlag, pp. 459-471, 2005.
- J. Zhang and J. Mao, “A novel ID-based designated verifier signature scheme,” Information Sciences, vol. 178, pp. 733–66, 2008.
- B. Kang, C. Boyd, and E. Dawson, “Identity-based strong designated verifier signature schemes: attacks and new construction,” Computer & Electrical Engineering, vol. 35, pp. 49-53, 2009.
- B. Kang, C. Boyd, and E. Dawson, “A novel identity-based strong designated verifier signature scheme,” The Journal of Systems & Software, vol. 82, pp. 270-273, 2009.
- J. Lee, J. Chang, and D. Lee, “Forgery atacks on Kang et al.s identity-based strong designated verifier signature scheme and its improvement with security proofs,” Computers and Electrical Engineering, vol. 36, pp. 948-954, 2010.
- H. Du and Q. Wen, “Attack on Kang et al.s Identity-Based Strong Designated Verifier Signature Scheme,” Cryptography eprint report 2006/134. International Association for CryptologicResearch, http://eprint.iacr.org/complete/2006/134.
- Q. Huang, G. Yang, D.-S.Wang, and W. Susilo, “Identity based strong designated verifier signature revisited,” The Journal of Systems and Software, vol. 84, pp. 120-129, 2011.
- M. Duan, J. Xu, and D. Feng, “Efficient identity-based strong designated verifier signature schemes,” Security and Communication Networks (6), Wiley, pp. 902-911, 2013.
- H. Wang, “Signer-admissible strong designated verifier signature from bilinear pairings,” Security and Communication Networks (7), Wiley, pp. 422-428, 2014.
- S.-H. Islam and G.-P. Biswas, “Provably secure and pairing-based strong designated verifier signature scheme with message recovery,” Arab Journal of Science Engineering Springer, vol. 40, pp. 1069-1080, 2015.
- X. Hu, H. Xu, Y. Liu, J. Wang, W. Tan, and X. Zhang, “An Efficient Designated Verifier Signature Scheme with Pairing-Free and Low Cost,” Security and Communication Networks, vol. 9, no. 18, pp. 5724-5732, 2017.
- X. Hu, W. Tan, H. Xu, J. Wang, and Ch. Ma, “Strong Designated Verifier Signature Scheme with Undeniable Property and Their Application,” Security and Communication Networks, pp. 1-9, 2017.
- Q. Huang, G. Yang, D. S. Wong, and W. Susilo, “Efficient Strong Designated Verifier Signature Scheme without Random Oracles or Delegatability,” Cryptography eprint Archive Report 2009/518, http://eprint.iacr.org/2009/518.pdf.
- S.-G. Worku, Ch. Xu, and J. Zhao, “Cloud data auditing with designated verifier”, Frontiers of Computer science, vol. 8, no. 3, pp. 503-512, 2014.
- M. Beheshti-Atashgah, M. Gardeshi, and M.-R. Aref, “A Designated Verifier Threshold Proxy Signature Scheme,” Journal of Electronic and cyber defense, vol. 1, no. 5, pp. 25-36, 2014. (In Persian)
|