Authenticated Key Establishment Protocols for a Home Health Care System
暂无分享,去创建一个
[1] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[2] Yingli Tian. S3-R1: the IBM smart surveillance system release 1 , 2005, 14th Annual International Conference on Wireless and Optical Communications, 2005. WOCC 2005.
[3] Guang-Zhong Yang,et al. Pervasive body sensor network: an approach to monitoring the post-operative surgical patient , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[4] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[5] Jonathan W. Hui,et al. Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[6] Yuan-Ting Zhang,et al. A design proposal of security architecture for medical body sensor networks , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[7] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[9] Guang-Zhong Yang,et al. A spatio-temporal architecture for context aware sensing , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[10] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[11] Panu Hämäläinen,et al. Security in Wireless Sensor Networks: Considerations and Experiments , 2006, SAMOS.
[12] Yuan-Ting Zhang,et al. Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[13] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[14] K.K. Venkatasubramanian,et al. Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.
[15] V. Muthukkumarasamy,et al. A Minimal Protocol for Authenticated Key Distribution in Wireless Sensor Networks , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.
[16] Energy Scavenging , 2003 .
[17] Vallipuram Muthukkumarasamy,et al. Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks , 2006 .
[18] E. M. Staderini,et al. UWB radars in medicine , 2002 .
[19] Mani Srivastava,et al. Energy Harvesting Aware Power Management , 2005 .
[20] Timo Hämäläinen,et al. A Survey of Application Distribution in Wireless Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..