General Outlook of Wireless Body Area Sensor Networks
暂无分享,去创建一个
Dhananjay Kumar | Sharmila | Pramod Kumar | Kumkum Som | Krista Chaudhary | Krista Chaudhary | Pramod Kumar | Dhananjay Kumar | Kumkum Som
[1] Ming Li,et al. Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.
[2] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[3] Aiqing Zhang,et al. Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain , 2018, Journal of Medical Systems.
[4] Chunhua Jin,et al. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network , 2018, Journal of Medical Systems.
[5] Jian Shen,et al. Implicit authentication protocol and self-healing key management for WBANs , 2018, Multimedia Tools and Applications.
[6] Kai Liu,et al. Multi-scale image fusion through rolling guidance filter , 2018, Future Gener. Comput. Syst..
[7] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[8] Chunhua Jin,et al. An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks , 2018, Journal of Medical Systems.
[9] Jian Shen,et al. A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..
[10] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[11] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] Elyes Ben Hamida,et al. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks , 2015, Journal of Medical Systems.
[13] Yanmei Zhang,et al. New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing , 2015, Journal of Medical Systems.
[14] Zhen Wang,et al. Rigorous or tolerant: The effect of different reputation attitudes in complex networks , 2017, Future Gener. Comput. Syst..
[15] Min Lei,et al. Dynamically enabled defense effectiveness evaluation of a home Internet based on vulnerability analysis and attack layer measurement , 2017, Personal and Ubiquitous Computing.