Verification of key establishment protocols for a home health care system
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3] Mani Srivastava,et al. Energy Harvesting Aware Power Management , 2005 .
[4] Yingli Tian. S3-R1: the IBM smart surveillance system release 1 , 2005, 14th Annual International Conference on Wireless and Optical Communications, 2005. WOCC 2005.
[5] Guang-Zhong Yang,et al. Pervasive body sensor network: an approach to monitoring the post-operative surgical patient , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[6] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[7] Michael Grüninger,et al. Introduction , 2002, CACM.
[8] Vallipuram Muthukkumarasamy,et al. Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks , 2006 .
[9] V. Muthukkumarasamy,et al. Authenticated Key Establishment Protocols for a Home Health Care System , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[10] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[11] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[12] Panu Hämäläinen,et al. Security in Wireless Sensor Networks: Considerations and Experiments , 2006, SAMOS.
[13] Donggang Liu,et al. Security for Wireless Sensor Networks , 2006, Advances in Information Security.
[14] David E. Culler,et al. Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[15] R. Geoff Dromey,et al. From requirements to design: formalizing the key steps , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..
[16] C. H. West,et al. General technique for communications protocol validation , 1978 .
[17] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[18] Vallipuram Muthukkumarasamy,et al. Analysis of Proposed Key Establishment Protocols in Multi-Tiered Sensor Networks , 2008, J. Networks.
[19] Edmund M. Clarke,et al. Formal Methods: State of the Art and Future Directions Working Group Members , 1996 .
[20] Vallipuram Muthukkumarasamy,et al. Formal verification of the IEEE 802.11i WLAN security protocol , 2006, Australian Software Engineering Conference (ASWEC'06).
[21] Yuan-Ting Zhang,et al. Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[22] K.K. Venkatasubramanian,et al. Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.