FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices
暂无分享,去创建一个
[1] Ingrid Verbauwhede,et al. On the Feasibility of Cryptography for a Wireless Insulin Pump System , 2016, CODASPY.
[2] Ingrid Verbauwhede,et al. The Energy Budget for Wireless Security: Extended Version , 2015, IACR Cryptol. ePrint Arch..
[3] Ingrid Verbauwhede,et al. Dude, is my code constant time? , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[4] Fan Zhang,et al. OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.
[5] Sandeep K. S. Gupta,et al. Physiological value-based efficient usable security solutions for body sensor networks , 2010, TOSN.
[6] Ayan Banerjee,et al. PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.
[7] David Oswald,et al. Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring System , 2017, WOOT.
[8] Jiguo Yu,et al. MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks , 2019, IEEE Access.
[9] Dawu Gu,et al. Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[10] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[11] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[12] Shoichi Hirose,et al. Some Plausible Constructions of Double-Block-Length Hash Functions , 2006, FSE.
[13] Bart Preneel,et al. On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them , 2016, ACSAC.
[14] Farinaz Koushanfar,et al. Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.
[15] Bart Preneel,et al. A Privacy-Preserving Remote Healthcare System Offering End-to-End Security , 2016, ADHOC-NOW.
[16] Tongbo Luo,et al. T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices , 2020, CCS.
[17] Christos Strydis,et al. Attacks on Heartbeat-Based Security Using Remote Photoplethysmography , 2018, IEEE Journal of Biomedical and Health Informatics.
[18] C. Rathgeb,et al. Statistical attack against fuzzy commitment scheme , 2012, IET Biom..
[19] Christoph Busch,et al. Biometric template protection for speaker recognition based on universal background models , 2015, IET Biom..
[20] Peter Schwabe,et al. Full-Size High-Security ECC Implementation on MSP430 Microcontrollers , 2014, LATINCRYPT.
[21] K.K. Venkatasubramanian,et al. Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[22] Juan E. Tapiador,et al. Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols , 2015, WISTP.
[23] Christos Strydis,et al. Peak misdetection in heart-beat-based security: Characterization and tolerance , 2014, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[24] Enrique Argones-Rúa,et al. On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols , 2019, SACMAT.
[25] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[26] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[27] Juan E. Tapiador,et al. Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals , 2018, Entropy.
[28] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[29] Fengyuan Xu,et al. IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.
[30] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[31] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[32] Bart Preneel,et al. Securing Wireless Neurostimulators , 2018, CODASPY.
[33] Enrique Argones-Rúa,et al. Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication , 2017, SACMAT.