SecPMS: An efficient and secure communication protocol for continuous patient monitoring system using body sensors
暂无分享,去创建一个
[1] Saru Kumari,et al. Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks , 2017, Peer Peer Netw. Appl..
[2] Muhammad Khurram Khan,et al. An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design , 2016, Secur. Commun. Networks.
[3] Xiong Li,et al. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks , 2017, Multimedia Systems.
[4] Bruce Schneier,et al. Cryptography Engineering - Design Principles and Practical Applications , 2010 .
[5] Robert Simon Sherratt,et al. A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB Mass Storage Devices , 2016, IEEE Transactions on Consumer Electronics.
[6] Abbas Jamalipour,et al. Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[7] Pardeep Kumar,et al. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks , 2012, Sensors.
[8] Maged Hamada Ibrahim,et al. Secure anonymous mutual authentication for star two-tier wireless body area networks , 2016, Comput. Methods Programs Biomed..
[9] Cheng-Chi Lee,et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.
[10] Cheng-Chi Lee,et al. A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System , 2016, Journal of Medical Systems.
[11] Muhammad Khurram Khan,et al. A robust and anonymous patient monitoring system using wireless medical sensor networks , 2018, Future Gener. Comput. Syst..
[12] Gerrit Bleumer. Random Oracle Model , 2005, Encyclopedia of Cryptography and Security.
[13] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[14] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[15] Nikolaos G. Bourbakis,et al. A Survey on Wearable Sensor-Based Systems for Health Monitoring and Prognosis , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[16] Robert Simon Sherratt,et al. Efficient biometric and password based mutual authentication for consumer USB mass storage devices , 2015, IEEE Transactions on Consumer Electronics.