Study on peak misdetection recovery of key exchange protocol using heartbeat
暂无分享,去创建一个
Kyung-Soo Lim | Kwantae Cho | Juyoung Kim | Yong-Kyun Kim | Sang Uk Shin | Sanguk Shin | Kwantae Cho | Kyung-Soo Lim | Juyoung Kim | Yong-kyun Kim
[1] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[2] Ravinder Kumar,et al. A Robust Fingerprint Matching System Using Orientation Features , 2016, J. Inf. Process. Syst..
[3] Manesh Kokare,et al. Iris Recognition Using Ridgelets , 2012, J. Inf. Process. Syst..
[4] 李烨,et al. Physiological Signal Based Biometrics for Securing Body Sensor Network , 2012 .
[5] Gengfa Fang,et al. A comparison of key distribution schemes using fuzzy commitment and fuzzy vault within wireless body area networks , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[6] Christos Strydis,et al. Secure key-exchange protocol for implants using heartbeats , 2016, Conf. Computing Frontiers.
[7] Jiankun Hu,et al. Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey , 2015, 2015 IEEE Twelfth International Symposium on Autonomous Decentralized Systems.
[8] Farinaz Koushanfar,et al. Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.
[9] Ye Li,et al. Physiological Signal Based Biometrics for Securing Body Sensor Network , 2012 .
[10] Carmen C. Y. Poon,et al. A biometrics based security solution for encryption and authentication in tele-healthcare systems , 2009, 2009 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies.
[11] Yuan-Ting Zhang,et al. An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks , 2015, Sensors.
[12] Ayan Banerjee,et al. PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.
[13] Ju-Sung Kang,et al. Probabilistic Analysis of AIS.31 Statistical Tests for TRNGs and Their Applications to Security Evaluations , 2016 .
[14] Carmen C. Y. Poon,et al. Using the Timing Information of Heartbeats as an Entity Identifier to Secure Body Sensor Network , 2008, IEEE Transactions on Information Technology in Biomedicine.
[15] Colleen Swanson,et al. SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.
[16] Axel Munk,et al. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.
[17] Rabah Attia,et al. ELPA: A new key agreement scheme based on linear prediction of ECG features for WBAN , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).
[18] Sandeep K. S. Gupta,et al. Physiological value-based efficient usable security solutions for body sensor networks , 2010, TOSN.
[19] Hsing-Chung Chen,et al. A fusion approach based on infrared finger vein transmitting model by using multi-light-intensity imaging , 2017, Human-centric Computing and Information Sciences.
[20] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..