ECASS: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems
暂无分享,去创建一个
[1] Yu-Fang Chung,et al. A Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[2] Sheng Zhong,et al. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.
[3] A. Kamilaris,et al. Integrating Web-Enabled Energy-Aware Smart Homes to the Smart Grid , 2012 .
[4] Anna Pagh,et al. Uniform hashing in constant time and linear space , 2003, STOC '03.
[5] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[6] Vladimir Stojanovic,et al. Design and Analysis of a Hardware-Efficient Compressed Sensing Architecture for Data Compression in Wireless Sensors , 2012, IEEE Journal of Solid-State Circuits.
[7] Vincent Yan Fu Tan,et al. Wireless Compressive Sensing for Energy Harvesting Sensor Nodes , 2012, IEEE Transactions on Signal Processing.
[8] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[9] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[10] Sherali Zeadally,et al. Authentication protocol for an ambient assisted living system , 2015, IEEE Communications Magazine.
[11] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[12] T. Blumensath,et al. Theory and Applications , 2011 .
[13] Liang Zhou,et al. Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.
[14] R.W. Stephenson,et al. Southwestern Bell Telephone's ISDN experience , 1989, IEEE Network.
[15] Aref Meddeb,et al. A broadcast authentication scheme in IoT environments , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[16] N. Hamid,et al. Image Steganography Techniques : An Overview , 2012 .
[17] Jian Wang,et al. Strong Authentication Scheme for Telecare Medicine Information Systems , 2011, Journal of Medical Systems.
[18] Saikat Saha,et al. Issues in Transmitting Physical Health Information in m-Healthcare , 2013 .
[19] Y. M. Huang,et al. Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.
[20] Hung-Ming Chen,et al. An Authentication Protocol for Ubiquitous Health Monitoring Systems , 2013 .
[21] Alisha Arora,et al. IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW , 2014 .
[22] Wei Liang,et al. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.
[23] Amir Hossein Jahangir,et al. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .
[24] Ian T. Downard,et al. Simulating Sensor Networks in NS-2 , 2004 .
[25] Sungyoung Lee,et al. An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.
[26] Lida Xu,et al. A Continuous Biomedical Signal Acquisition System Based on Compressed Sensing in Body Sensor Networks , 2013, IEEE Transactions on Industrial Informatics.