Authentication of lossy data in body-sensor networks for healthcare monitoring
暂无分享,去创建一个
[1] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..
[2] Kok-Kiong Yap,et al. Link layer behavior of body area networks at 2.4 GHz , 2009, MobiCom '09.
[3] Peter Sanders,et al. Polynomial time algorithms for network information flow , 2003, SPAA '03.
[4] Dimitri Konstantas,et al. MobiHealth-Innovative 2.5/3G mobile services and applications for health care , 2002 .
[5] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[6] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[7] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Duncan Graham-Rowe. Body organs can send status updates to yo ur cellphone , 2010 .
[9] Peng Ning,et al. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[10] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[11] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[12] Edwin K. P. Chong,et al. Efficient multicast stream authentication using erasure codes , 2003, TSEC.
[13] J. Deng,et al. Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[14] Lawrence Wai-Choong Wong,et al. A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[15] Bharat K. Bhargava,et al. A tree-based forward digest protocol to verify data integrity in distributed media streaming , 2005, IEEE Transactions on Knowledge and Data Engineering.
[16] M. Anwar Hasan,et al. Look-Up Table-Based Large Finite Field Multiplication in Memory Constrained Cryptosystems , 2000, IEEE Trans. Computers.
[17] X. N. Zhang. Secure Code Distribution , 1997, Computer.
[18] Refik Molva,et al. Efficient Multicast Packet Authentication , 2003, NDSS.
[19] Muriel Médard,et al. On coding for reliable communication over packet networks , 2005, Phys. Commun..
[20] Vijay Sivaraman,et al. Transmission Power Control in Body Area Sensor Networks for Healthcare Monitoring , 2009, IEEE Journal on Selected Areas in Communications.