Chaos Based Enhanced RC5 Algorithm for Security and Integrity of Clinical Images in Remote Health Monitoring
暂无分享,去创建一个
Syed Muhammad Anwar | Joel J. P. C. Rodrigues | Mudassar Ali | Farhan Qamar | Romana Shahzadi | J. Rodrigues | Farhan Qamar | Romana Shahzadi | Mudassar Ali | S. Anwar
[1] Vallipuram Muthukkumarasamy,et al. Performance Evaluation of Block Ciphers for Wireless Sensor Networks , 2016 .
[2] Kyung Sup Kwak,et al. Hybrid security mechanisms for wireless body area networks , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).
[3] Ahmed H. Tewfik,et al. Geometric Invariance in image watermarking , 2004, IEEE Transactions on Image Processing.
[4] Christina Synowiec,et al. E-health in low- and middle-income countries: findings from the Center for Health Market Innovations. , 2012, Bulletin of the World Health Organization.
[5] Kyung Sup Kwak,et al. An efficient certificateless remote anonymous authentication scheme for wireless body area networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[6] Kyung Sup Kwak,et al. A Study of Implanted and Wearable Body Sensor Networks , 2008, KES-AMSTA.
[7] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[8] Jian Shen,et al. A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..
[9] Athanasios V. Vasilakos,et al. ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[10] Ljupco Kocarev,et al. Chaotic block ciphers: from theory to practical algorithms , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[11] Lu Zhang,et al. An Efficient and Lightweight Certificateless Authentication Protocol for Wireless Body Area Networks , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[12] Ahmed G. Radwan,et al. Generalized double-humped logistic map-based medical image encryption , 2018, Journal of advanced research.
[13] Mudassar Ali,et al. Performance analysis of chaotic FSO communication system under different weather conditions , 2018, Trans. Emerg. Telecommun. Technol..
[14] Ming Li,et al. Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[15] Fan Zhang,et al. OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.
[16] Mohammed Feham,et al. Trust Key Management Scheme for Wireless Body Area Networks , 2011, Int. J. Netw. Secur..
[17] Bobby D. Gerardo,et al. An enhanced RC5 (ERC5) algorithm based on simple random number key expansion technique , 2018, 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE).
[18] Nikesh Bajaj,et al. Enhancement of RC5 for image encryption , 2011, 2011 International Conference on Image Information Processing.
[19] Henry O. Nyongesa,et al. Using Wearable Sensors for Remote Healthcare Monitoring System , 2011, J. Sens. Technol..
[20] Yue Wu,et al. Image encryption using the two-dimensional logistic chaotic map , 2012, J. Electronic Imaging.
[21] Mats Björkman,et al. Communication and Security in Health Monitoring Systems -- A Review , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[22] K.K. Venkatasubramanian,et al. Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[23] Sang Hyuk Son,et al. The price of security in wireless sensor networks , 2010, Comput. Networks.
[24] Pugalendhi Ganesh Kumar,et al. Secured remote health monitoring system , 2017, Healthcare technology letters.
[25] Heejo Lee,et al. BARI: A Distributed Key Management Approach for Wireless Body Area Networks , 2009, 2009 International Conference on Computational Intelligence and Security.
[26] Osama S. Farag Allah,et al. Implementation of RC5 Block Cipher Algorithm for Image Cryptosystems , 2007 .
[27] Miguel Angel Murillo-Escobar,et al. A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine , 2017, Journal of Medical Systems.
[28] Rengarajan Amirtharajan,et al. Encryption and watermark-treated medical image against hacking disease - An immune convention in spatial and frequency domains , 2018, Comput. Methods Programs Biomed..
[29] Naveed Khan,et al. An LBP Based Key Management for Secure Wireless Body Area Network (WBAN) , 2013, 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.
[30] D. Aju,et al. An Efficient and Optimized RC5 Image Encryption Algorithm for Secured Image Transmission , 2015 .
[31] Lauri Sydanheimo,et al. RC5-based security in wireless sensor networks: utilization and performance , 2010 .
[32] M. F. Abdollah,et al. A biometric-based security for data authentication in Wireless Body Area Network (WBAN) , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).
[33] Jin-Meng Ho,et al. A versatile suite of strong authenticated key agreement protocols for body area networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[34] Yang Li,et al. Measurement of around-body creeping waves using wearable sensor modules , 2018, 2018 Texas Symposium on Wireless and Microwave Circuits and Systems (WMCS).
[35] Jia Wang,et al. An ECG-Based Signal Key Establishment Protocol in Body Area Networks , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.
[36] Osama S. Faragallah,et al. An enhanced chaotic key‐based RC5 block cipher adapted to image encryption , 2012 .
[37] Musheer Ahmad,et al. Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos , 2018, Symmetry.
[38] Jiankun Hu,et al. A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications , 2011, Secur. Commun. Networks.
[39] Mudassar Ali,et al. Secure Duobinary Signal Transmission in Optical Communication Networks for High Performance & Reliability , 2017, IEEE Access.