메뉴 건너뛰기




Volumn 4572 LNCS, Issue , 2007, Pages 172-186

Security for mobile low power nodes in a personal area network by means of trusted platform modules

Author keywords

Platform integrity of resource constrained device; Remote controlled infusion pump; Teletherapy of pain

Indexed keywords

CONSTRAINT THEORY; DATA PRIVACY; LOCAL AREA NETWORKS; NETWORK SECURITY; SERVERS; UBIQUITOUS COMPUTING;

EID: 38149048562     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73275-4_13     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 1
    • 38149092768 scopus 로고    scopus 로고
    • Health Monitoring System
    • PHMon: Personal Health Monitoring System, http://www.phmon.de/englisch
    • Personal
    • PHMon1
  • 2
    • 0141972410 scopus 로고    scopus 로고
    • Research Issues in Ad-Hoc Distributed Personal Networking
    • Niemegeers, I.G., de Groot, S.M.H.: Research Issues in Ad-Hoc Distributed Personal Networking. Wireless Personal Communications 26(2-3), 149-167 (2003)
    • (2003) Wireless Personal Communications , vol.26 , Issue.2-3 , pp. 149-167
    • Niemegeers, I.G.1    de Groot, S.M.H.2
  • 5
    • 0842310826 scopus 로고    scopus 로고
    • Security mechanisms for wireless home network
    • Zhuge, J., Yao, R.: Security mechanisms for wireless home network. Global Telecommunications Conference 3, 1527-1531 (2003)
    • (2003) Global Telecommunications Conference , vol.3 , pp. 1527-1531
    • Zhuge, J.1    Yao, R.2
  • 6
    • 0035395659 scopus 로고    scopus 로고
    • Facing the challenge of wireless security
    • Miller, S.: Facing the challenge of wireless security. Computer 34(7), 16-18 (2001)
    • (2001) Computer , vol.34 , Issue.7 , pp. 16-18
    • Miller, S.1
  • 7
    • 2342603906 scopus 로고    scopus 로고
    • Ravi, S., Raghunathan, A., Chakradhar, S.: Embedding security in wireless embedded systems. In: VLSI Design, 2003. Proceedings. 16th International Conference on (2003), pp. 269-270 (2003)
    • Ravi, S., Raghunathan, A., Chakradhar, S.: Embedding security in wireless embedded systems. In: VLSI Design, 2003. Proceedings. 16th International Conference on (2003), pp. 269-270 (2003)
  • 9
    • 84876375076 scopus 로고    scopus 로고
    • Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
    • Buttyán, L, Gligor, V, Westhoff, D, eds, Security and Privacy in Ad-Hoc and Sensor Networks, Springer, Heidelberg
    • Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) Security and Privacy in Ad-Hoc and Sensor Networks. LNCS, vol. 4357, pp. 6-17. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4357 , pp. 6-17
    • Batina, L.1    Mentens, N.2    Sakiyama, K.3    Preneel, B.4    Verbauwhede, I.5
  • 10
    • 33745460536 scopus 로고    scopus 로고
    • Smyth, N., McLoone, M., McCanny, J.: Reconfigurable cryptographic RISC microprocessor. In: VLSI Design, Automation and Test (VLSI-TSA-DAT). 2005 IEEE VLSI-TSA International Symposium on (2005), pp. 29-32 (2005)
    • Smyth, N., McLoone, M., McCanny, J.: Reconfigurable cryptographic RISC microprocessor. In: VLSI Design, Automation and Test (VLSI-TSA-DAT). 2005 IEEE VLSI-TSA International Symposium on (2005), pp. 29-32 (2005)
  • 12
    • 33750436929 scopus 로고    scopus 로고
    • About malicious software in smartphones
    • Töyssy, S., Helenius, M.: About malicious software in smartphones. Journal in Computer Virology 2(2), 109-119 (2006)
    • (2006) Journal in Computer Virology , vol.2 , Issue.2 , pp. 109-119
    • Töyssy, S.1    Helenius, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.