Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks
暂无分享,去创建一个
Daojing He | Sammy Chan | Yan Zhang | Haomiao Yang | Daojing He | Yan Zhang | Sammy Chan | Haomiao Yang
[1] Wu-chi Feng,et al. DHV: A Code Consistency Maintenance Protocol for Multi-hop Wireless Sensor Networks , 2009, EWSN.
[2] Athanasios V. Vasilakos,et al. ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[3] Philip Levis,et al. Data Discovery and Dissemination with DIP , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[4] Sheng Zhong,et al. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.
[5] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[6] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[7] A. Meyer. The Health Insurance Portability and Accountability Act. , 1997, Tennessee medicine : journal of the Tennessee Medical Association.
[8] David E. Culler,et al. Design of an application-cooperative management system for wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[9] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[10] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[11] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[12] Chin-Laung Lei,et al. Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters , 2008, DCOSS.
[13] Mohsen Guizani,et al. Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.
[14] Chun Chen,et al. Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[15] Sang Hyuk Son,et al. The price of security in wireless sensor networks , 2010, Comput. Networks.
[16] Adrian Perrig,et al. Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes , 2007, SenSys '07.
[17] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[18] Lan Wang,et al. Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network , 2008, Sensors.