메뉴 건너뛰기




Volumn , Issue , 2008, Pages 363-368

Verification of key establishment protocols for a home health care system

Author keywords

[No Author keywords available]

Indexed keywords

BEHAVIOUR TREES; BODY SENSOR NETWORKS; CHRONIC DISEASE; GENETIC DESIGNS; HEALTH CARE SYSTEMS; HOME HEALTH CARES; KEY ESTABLISHMENT PROTOCOLS; MEMORY REQUIREMENTS; MODEL CHECKERS; PHYSIOLOGICAL DATUM; SALIENT FEATURES;

EID: 63149190349     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSNIP.2008.4762015     Document Type: Conference Paper
Times cited : (9)

References (28)
  • 4
    • 34548239629 scopus 로고    scopus 로고
    • Network topologies, communication protocols, and standards
    • G.-Z. Yang, Ed. Springer-Verlag
    • J. Espina, T. Falck, and O. Mülhens, "Network topologies, communication protocols, and standards," in Body Sensor Networks, G.-Z. Yang, Ed. Springer-Verlag, 2006.
    • (2006) Body Sensor Networks
    • Espina, J.1    Falck, T.2    Mülhens, O.3
  • 8
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • IEEE Computer Society Press, Mar
    • H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proceedings of IEEE Infocom. IEEE Computer Society Press, Mar. 2005.
    • (2005) Proceedings of IEEE Infocom
    • Chan, H.1    Perrig, A.2
  • 11
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
    • April
    • C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Communications Magazine, vol. 44, pp. 73-81, April 2006.
    • (2006) IEEE Communications Magazine , vol.44 , pp. 73-81
    • Poon, C.C.Y.1    Zhang, Y.-T.2    Bao, S.-D.3
  • 13
    • 0017985798 scopus 로고
    • General technique for communications protocol validation
    • C. West, "General technique for communications protocol validation," IBM Journal of Research and Development, vol. 22, no. 4, 1978.
    • (1978) IBM Journal of Research and Development , vol.22 , Issue.4
    • West, C.1
  • 14
    • 0000289556 scopus 로고    scopus 로고
    • Formal methods: State of the art and future directions
    • E. M. Clarke and J. M. Wing, "Formal methods: state of the art and future directions," ACM Comput. Surv., vol. 28, no. 4, pp. 626-643, 1996.
    • (1996) ACM Comput. Surv , vol.28 , Issue.4 , pp. 626-643
    • Clarke, E.M.1    Wing, J.M.2
  • 16
    • 63149169200 scopus 로고    scopus 로고
    • From requirements to design: Formalizing the key steps
    • R. Dromey, "From requirements to design: Formalizing the key steps," sefm, vol. 00, p. 2, 2003.
    • (2003) sefm , vol.0 , pp. 2
    • Dromey, R.1
  • 18
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • IEEE Computer Society Press
    • S. M. Bellovin and M. Merritt, "Encrypted key exchange: Password-based protocols secure against dictionary attacks," in IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1992, pp. 72-84.
    • (1992) IEEE Symposium on Research in Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 20
    • 47749133330 scopus 로고    scopus 로고
    • Crossbow, "Crossbow," http://www.xbow.com/, 2006.
    • (2006) Crossbow
    • Crossbow1
  • 22
    • 63149186377 scopus 로고    scopus 로고
    • Performance analysis of proposed key establishment protocols in multi-tiered sensor networks
    • K. Singh and V. Muthukkumarasamy, "Performance analysis of proposed key establishment protocols in multi-tiered sensor networks," Journal of Networks, vol. 3, no. 6, 2008.
    • (2008) Journal of Networks , vol.3 , Issue.6
    • Singh, K.1    Muthukkumarasamy, V.2
  • 26
    • 34247376029 scopus 로고    scopus 로고
    • P. K. Dutta, J. W Hui, D. C. Chu, and D. E. Culler, Securing the deluge network programming system, In the Fifth International Conference on Information Processing in Sensor Networks (IPSN'06), April 2006.
    • P. K. Dutta, J. W Hui, D. C. Chu, and D. E. Culler, "Securing the deluge network programming system," In the Fifth International Conference on Information Processing in Sensor Networks (IPSN'06), April 2006.
  • 28
    • 84869272016 scopus 로고    scopus 로고
    • A. Liu, P. Kampanakis, and P. Ning, Tinyecc: Elliptic curve cryptography for sensor networks version 0.3, February 2007
    • A. Liu, P. Kampanakis, and P. Ning, "Tinyecc: Elliptic curve cryptography for sensor networks (version 0.3)," February 2007, http://discovery.csc.ncsu.edu/software/TinyECC/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.