Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography
暂无分享,去创建一个
[1] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[2] Galen Reeves,et al. A compressed sensing wire-tap channel , 2011, 2011 IEEE Information Theory Workshop.
[3] Gill R. Tsouri,et al. Threshold Constraints on Symmetric Key Extraction from Rician Fading Estimates , 2013, IEEE Transactions on Mobile Computing.
[4] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[5] U. S. Centers for Medicare Medicaid Services,et al. Centers for Medicare & Medicaid Services (CMS) , 2013 .
[6] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[7] C M Faddick. Health care fraud and abuse: new weapons, new penalties, and new fears for providers created by the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"). , 1997, Annals of health law.
[8] Y. Rachlin,et al. The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[9] Babak Seyfe,et al. Perfect Secrecy Using Compressed Sensing , 2010, ArXiv.
[10] Gill R. Tsouri,et al. Reliable symmetric key generation for body area networks using wireless physical layer security in the presence of an on-body eavesdropper , 2011, ISABEL '11.
[11] Paul S Addison,et al. Wavelet transforms and the ECG: a review , 2005, Physiological measurement.
[12] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[13] Ingrid Daubechies,et al. Ten Lectures on Wavelets , 1992 .
[14] Babak Seyfe,et al. Perfect secrecy via compressed sensing , 2010, 2013 Iran Workshop on Communication and Information Theory.
[15] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[16] Gill R. Tsouri,et al. Establishing secure measurement matrix for compressed sensing using wireless physical layer security , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] Emmanuel J. Candès,et al. Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.
[19] Norman C. Beaulieu,et al. Novel Sum-of-Sinusoids Simulation Models for Rayleigh and Rician Fading Channels , 2006, IEEE Transactions on Wireless Communications.
[20] James W Warren,et al. On designing and testing transformations for derivation of standard 12-lead/18-lead electrocardiograms and vectorcardiograms from reduced sets of predictor leads. , 2008, Journal of electrocardiology.
[21] S. Frick,et al. Compressed Sensing , 2014, Computer Vision, A Reference Guide.
[22] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[23] Korbinian Strimmer,et al. Entropy Inference and the James-Stein Estimator, with Application to Nonlinear Gene Association Networks , 2008, J. Mach. Learn. Res..
[24] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[25] Thomas Strohmer,et al. General Deviants: An Analysis of Perturbations in Compressed Sensing , 2009, IEEE Journal of Selected Topics in Signal Processing.