1. L. Zhou, V. Varadharajan, M. Hitchens, Cryptographic role based access control for secure cloud data storage systems. Inf. Forensics Sec. IEEE Trans. 10(11), 2381–2395 (2015)
2. F. Chen, T. Xiang, Y. Yang, S.S.M. Chow, Secure cloud storage meets with secure network coding, in IEEE INFOCOM (2014), pp. 673–681
3. D. He, S. Zeadally, L. Wu, Certificate less public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 1–10 (2015)
4. W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
5. J. Shen, H. Tan, S. Moh, I. Chung, J. Wang, An efficient rfid authentication protocol providing strong privacy and security. J. Internet Technol. 17(3), 2 (2016)