BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks
暂无分享,去创建一个
[1] Heejo Lee,et al. BARI: A Distributed Key Management Approach for Wireless Body Area Networks , 2009, 2009 International Conference on Computational Intelligence and Security.
[2] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[3] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[4] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[5] Mohamed Eltoweissy,et al. Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.
[6] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[7] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[8] Young-Koo Lee,et al. TIMAR: an efficient key management scheme for ubiquitous health care environments , 2009, Mobimedia 2009.
[9] Gianluca Dini,et al. An efficient key revocation protocol for wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[10] Mohamed Eltoweissy,et al. TKGS: verifiable threshold-based key generation scheme in open wireless ad hoc networks , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).
[11] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[12] Thomas Falck,et al. Plug 'n Play Simplicity for Wireless Medical Body Sensors , 2006, 2006 Pervasive Health Conference and Workshops.
[13] Nael B. Abu-Ghazaleh,et al. A taxonomy of wireless micro-sensor network models , 2002, MOCO.
[14] Young-Koo Lee,et al. TIMAR: an efficient key management scheme for ubiquitous health care environments , 2009, MobiMedia.
[15] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[16] Mohamed F. Younis,et al. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.
[17] Mel Slater,et al. Biometric random number generators , 2004, Comput. Secur..
[18] Chong-Sun Hwang,et al. An Energy-Efficient Key Management Protocol For Large-Scale Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[19] Aleksandar Milenkovic,et al. System architecture of a wireless body area sensor network for ubiquitous health monitoring , 2005 .
[20] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[21] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[22] Dimitrios Hatzinakos,et al. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling , 2008, EURASIP J. Adv. Signal Process..
[23] Deva Seetharam,et al. An efficient pseudo random number generator for low-power sensor networks [wireless networks] , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[24] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[25] K.K. Venkatasubramanian,et al. Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[26] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[27] Frank Mueller,et al. Encryption overhead in embedded systems and sensor network nodes: modeling and analysis , 2003, CASES '03.
[28] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[29] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[30] K.K. Venkatasubramanian,et al. Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.
[31] Heejo Lee,et al. MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks , 2010, Ann. des Télécommunications.
[32] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[33] Ying Zhang,et al. Minimum power configuration in wireless sensor networks , 2005, MobiHoc '05.
[34] Panayiotis Kotzanikolaou,et al. Secure and practical key establishment for distributed sensor networks , 2009, Secur. Commun. Networks.
[35] Ayan Banerjee,et al. Challenges of implementing cyber-physical security solutions in body area networks , 2009, BODYNETS.
[36] Bülent Yener,et al. Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.
[37] Jingsha He,et al. A hexagon-based key predistribution scheme in sensor networks , 2006, 2006 International Conference on Parallel Processing Workshops (ICPPW'06).
[38] Sungyoung Lee,et al. LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network , 2006, PWC.