Enabling data protection through PKI encryption in IoT m-Health devices
暂无分享,去创建一个
Flora Malamateniou | George Vassilacopoulos | Vassiliki Koufi | Ilias Maglogiannis | Charalampos Doukas | G. Vassilacopoulos | V. Koufi | F. Malamateniou | Ilias Maglogiannis | C. Doukas | Vassiliki Koufi
[1] D. Bhattacharya. Secure Data Aggregation in Wireless Sensor Networks , 2014 .
[2] Huiru Zheng,et al. Visualization of data for ambient assisted living services , 2011, IEEE Communications Magazine.
[3] F. Kargl,et al. Security, Privacy and Legal Issues in Pervasive eHealth Monitoring Systems , 2008, 2008 7th International Conference on Mobile Business.
[4] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[5] Dieter Hayn,et al. The Internet of Things for Ambient Assisted Living , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[6] Elisa Bertino,et al. Trust Negotiation in Identity Management , 2007, IEEE Security & Privacy.
[7] Ilias Maglogiannis,et al. Bringing IoT and Cloud Computing towards Pervasive Healthcare , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[8] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[9] Ilias Maglogiannis,et al. Managing Wearable Sensor Data through Cloud Computing , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[10] Dirk Westhoff,et al. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[11] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[12] Yacine Challal,et al. SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks , 2007 .
[13] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[14] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[15] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[16] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[17] Vikram Srinivasan,et al. Information Coverage and Network Lifetime in Energy Constrained Wireless Sensor Networks , 2007 .
[18] Sabrina Sicari,et al. SeDAP: Secure Data Aggregation Protocol in Privacy Aware Wireless Sensor Networks , 2010, S-CUBE.
[19] Gennaro Boggia,et al. DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks , 2012, J. Syst. Softw..
[20] Roberto Riggio,et al. Secure aggregation in hybrid mesh/sensor networks , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.
[21] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..