Public-Key Authentication for Cloud-based WBANs
暂无分享,去创建一个
Athanasios V. Vasilakos | Muhammad Ali Imran | Khalid A. Qaraqe | M. Zeeshan Shakir | Bassam Jamil Mohd | Ghada A. Al-Mashaqbeh | Thaier Hayajneh | M. Imran | A. Vasilakos | K. Qaraqe | T. Hayajneh | M. Z. Shakir | B. Mohd | G. Al-Mashaqbeh
[1] P. Brandão. Abstracting information on body area networks , 2012 .
[2] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[3] Hoh Peter In,et al. A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks , 2014, Inf. Sci..
[4] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[5] Vlado Handziski,et al. Experimental Study of the Impact of WLAN Interference on IEEE 802.15.4 Body Area Networks , 2009, EWSN.
[6] Athanasios V. Vasilakos,et al. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[7] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[8] Farid Touati,et al. U-Healthcare System: State-of-the-Art Review and Challenges , 2013, Journal of Medical Systems.
[9] Ingrid Moerman,et al. A Comprehensive Survey of Wireless Body Area Networks , 2012, Journal of Medical Systems.
[10] Hong Liu,et al. Modeling of WBAN and Cloud Integration for Secure and Reliable Healthcare , 2013, BODYNETS.
[11] Miodrag Potkonjak,et al. mHealthMon: Toward Energy-Efficient and Distributed Mobile Health Monitoring Using Parallel Offloading , 2013, 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[12] Xiaofei Wang,et al. Cloud-enabled wireless body area networks for pervasive healthcare , 2013, IEEE Network.
[13] Athanasios V. Vasilakos,et al. ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[14] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[15] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[16] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[17] Cormac J. Sreenan,et al. A context aware wireless body area network (BAN) , 2009, 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare.
[18] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[19] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[20] Vicki Almstrum,et al. Low-cost remote patient monitoring system based on reduced platform computer technology. , 2011, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.
[21] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[22] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[23] Athanasios V. Vasilakos,et al. Cloud-assisted body area networks: state-of-the-art and future challenges , 2014, Wirel. Networks.
[24] Athanasios V. Vasilakos,et al. A survey of wireless technologies coexistence in WBAN: analysis and open research issues , 2014, Wireless Networks.
[25] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[26] Xuemin Shen,et al. SPS: Secure personal health information sharing with patient-centric access control in cloud computing , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[27] Christof Paar,et al. Elliptic and hyperelliptic curves on embedded μP , 2004, TECS.
[28] Ingrid Moerman,et al. A survey on wireless body area networks , 2011, Wirel. Networks.