Authentication and key relay in medical cyber-physical systems
暂无分享,去创建一个
[1] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[2] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[3] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[4] Alec Yasinsac,et al. Formal analysis of modern security protocols , 2005, Inf. Sci..
[5] Lan Wang,et al. SNAP: an architecture for secure medical sensor networks , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.
[6] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[7] Georgios Kambourakis,et al. Securing Medical Sensor Environments: The CodeBlue Framework Case , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[8] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[9] K.K. Venkatasubramanian,et al. Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[10] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[11] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[12] Wayne H. Wolf,et al. Cyber-physical Systems , 2009, Computer.
[13] Y. M. Huang,et al. Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.
[14] Ayan Banerjee,et al. PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.
[15] Insup Lee,et al. Toward patient safety in closed-loop medical device systems , 2010, ICCPS '10.
[16] Hamid Sharif,et al. Resource-aware secure ECG healthcare monitoring through body sensor networks , 2010, IEEE Wireless Communications.
[17] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[18] Hong Liu,et al. Mobile Healthcare Infrastructure with Qos and Security , 2010, MOBILWARE.
[19] Insup Lee,et al. Medical Cyber Physical Systems , 2010, Design Automation Conference.
[20] Hong Liu,et al. Secure architecture for healthcare Wireless Sensor Networks , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[21] Ingrid Moerman,et al. A Comprehensive Survey of Wireless Body Area Networks , 2012, Journal of Medical Systems.
[22] Xiaohui Liang,et al. A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network , 2011, Mob. Networks Appl..
[23] L. Ungar,et al. Limitations of Threshold-Based Brain Oxygen Monitoring for Seizure Detection , 2011, Neurocritical care.
[24] Athanasios V. Vasilakos,et al. Body Area Networks: A Survey , 2010, Mob. Networks Appl..
[25] Syed Taha Ali,et al. Improving secret key generation performance for on-body devices , 2011, BODYNETS.
[26] Ayan Banerjee,et al. BAND-AiDe: A Tool for Cyber-Physical Oriented Analysis and Design of Body Area Networks and Devices , 2012, TECS.
[27] Insup Lee,et al. Challenges and Research Directions in Medical Cyber–Physical Systems , 2012, Proceedings of the IEEE.
[28] Athanasios V. Vasilakos,et al. ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[29] Chunming Rong,et al. Authenticated health monitoring scheme for wireless body sensor networks , 2012, BODYNETS.
[30] Hong Liu,et al. Modeling and characterization of GPS spoofing , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[31] Ming Li,et al. Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.
[32] Ming Li,et al. BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2013, IEEE J. Sel. Areas Commun..
[33] Hong Liu,et al. A Generic Authentication Protocol for Wireless Body Area Networks , 2013, BODYNETS.
[34] Wei-Tek Tsai,et al. Mobile Cloud Computing Research - Issues, Challenges and Needs , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.
[35] Hong Liu,et al. Risk Quantification of Security Authentication: A Predictability Modeling Approach , 2013 .
[36] Xiaofei Wang,et al. Cloud-enabled wireless body area networks for pervasive healthcare , 2013, IEEE Network.
[37] Farinaz Koushanfar,et al. Balancing security and utility in Medical Devices? , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).
[38] Guang-Zhong Yang,et al. Body sensor networks , 2006 .