-
1
-
-
63149190349
-
Authenticated key establishment protocols for a home health care system
-
Melbourne, Australia, December
-
K. Singh and V. Muthukkumarasamy, "Authenticated key establishment protocols for a home health care system," in Proceedings of the Third International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, Australia, December 2007.
-
(2007)
Proceedings of the Third International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
-
-
Singh, K.1
Muthukkumarasamy, V.2
-
2
-
-
20144371970
-
S3-r1: The ibm smart surveillance system-release 1
-
New York, NY, USA: ACM Press
-
A. Hampapur, L. Brown, J. Connell, N. Haas, M. Lu, H. Merkl, S. Pankanti, A. Senior, C.-F. Shu, and Y. Tian, "S3-r1: the ibm smart surveillance system-release 1," in ETP '04: Proceedings of the 2004 ACM SIGMM workshop on Effective telepresence. New York, NY, USA: ACM Press, 2004, pp. 59-62.
-
(2004)
ETP '04: Proceedings of the 2004 ACM SIGMM workshop on Effective telepresence
, pp. 59-62
-
-
Hampapur, A.1
Brown, L.2
Connell, J.3
Haas, N.4
Lu, M.5
Merkl, H.6
Pankanti, S.7
Senior, A.8
Shu, C.-F.9
Tian, Y.10
-
4
-
-
34548239629
-
Network topologies, communication protocols, and standards
-
G.-Z. Yang, Ed. Springer-Verlag
-
J. Espina, T. Falck, and O. Mülhens, "Network topologies, communication protocols, and standards," in Body Sensor Networks, G.-Z. Yang, Ed. Springer-Verlag, 2006.
-
(2006)
Body Sensor Networks
-
-
Espina, J.1
Falck, T.2
Mülhens, O.3
-
5
-
-
51349118086
-
Introduction
-
G.-Z. Yang, Ed. Springer-Verlag
-
O. Aziz, B. Lo, A. Darzi, and G.-Z. Yang, "Introduction," in Body Sensor Networks, G.-Z. Yang, Ed. Springer-Verlag, 2006.
-
(2006)
Body Sensor Networks
-
-
Aziz, O.1
Lo, B.2
Darzi, A.3
Yang, G.-Z.4
-
7
-
-
33746687870
-
Security in wireless sensor networks: Considerations and experiments
-
P. Hämäläinen, M. Kuorilehto, T. Alho, M. Hännikäinen, and T. D. Hämäläinen, "Security in wireless sensor networks: Considerations and experiments." in SAMOS, 2006, pp. 167-177.
-
(2006)
SAMOS
, pp. 167-177
-
-
Hämäläinen, P.1
Kuorilehto, M.2
Alho, T.3
Hännikäinen, M.4
Hämäläinen, T.D.5
-
8
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
IEEE Computer Society Press, Mar
-
H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proceedings of IEEE Infocom. IEEE Computer Society Press, Mar. 2005.
-
(2005)
Proceedings of IEEE Infocom
-
-
Chan, H.1
Perrig, A.2
-
9
-
-
47749111952
-
Protecting small keys in authentication protocols for wireless sensor networks
-
Melbourne, Australia, December
-
K. Singh, K. Bhatt, and V. Muthukkumarasamy, "Protecting small keys in authentication protocols for wireless sensor networks," in Proceedings of the Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, December 2006, pp. 31-35.
-
(2006)
Proceedings of the Australian Telecommunication Networks and Applications Conference
, pp. 31-35
-
-
Singh, K.1
Bhatt, K.2
Muthukkumarasamy, V.3
-
11
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
April
-
C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Communications Magazine, vol. 44, pp. 73-81, April 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, pp. 73-81
-
-
Poon, C.C.Y.1
Zhang, Y.-T.2
Bao, S.-D.3
-
12
-
-
33846925115
-
Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems
-
IEEE Press
-
S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, "Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems," in 27th Annual International Conference of the Engineering in Medicine and Biology Society, 2005. IEEE Press, 2005, pp. 2455-2458.
-
(2005)
27th Annual International Conference of the Engineering in Medicine and Biology Society
, pp. 2455-2458
-
-
Bao, S.-D.1
Zhang, Y.-T.2
Shen, L.-F.3
-
13
-
-
0017985798
-
General technique for communications protocol validation
-
C. West, "General technique for communications protocol validation," IBM Journal of Research and Development, vol. 22, no. 4, 1978.
-
(1978)
IBM Journal of Research and Development
, vol.22
, Issue.4
-
-
West, C.1
-
14
-
-
0000289556
-
Formal methods: State of the art and future directions
-
E. M. Clarke and J. M. Wing, "Formal methods: state of the art and future directions," ACM Comput. Surv., vol. 28, no. 4, pp. 626-643, 1996.
-
(1996)
ACM Comput. Surv
, vol.28
, Issue.4
, pp. 626-643
-
-
Clarke, E.M.1
Wing, J.M.2
-
15
-
-
33750125870
-
Formal verification of the ieee 802. 11i wlan security protocol
-
Sydney, Australia
-
E. Sithirasenan, S. Zafar, and V. Muthukkumarasamy, "Formal verification of the ieee 802. 11i wlan security protocol," in Australian Software Engineering Conference (ASWEC '06), Sydney, Australia, 2006.
-
(2006)
Australian Software Engineering Conference (ASWEC '06)
-
-
Sithirasenan, E.1
Zafar, S.2
Muthukkumarasamy, V.3
-
16
-
-
63149169200
-
From requirements to design: Formalizing the key steps
-
R. Dromey, "From requirements to design: Formalizing the key steps," sefm, vol. 00, p. 2, 2003.
-
(2003)
sefm
, vol.0
, pp. 2
-
-
Dromey, R.1
-
17
-
-
43949092250
-
Security for pervasive health monitoring sensor applications
-
Bangalore, India: IEEE Press, December
-
K. K. Venkatasubramanian and S. K. S. Gupta, "Security for pervasive health monitoring sensor applications," in ICISIP '06: Proceedings of the 4th International Conference on Intelligent Sensing and Information Processing. Bangalore, India: IEEE Press, December 2006, pp. 197-202.
-
(2006)
ICISIP '06: Proceedings of the 4th International Conference on Intelligent Sensing and Information Processing
, pp. 197-202
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
18
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
IEEE Computer Society Press
-
S. M. Bellovin and M. Merritt, "Encrypted key exchange: Password-based protocols secure against dictionary attacks," in IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1992, pp. 72-84.
-
(1992)
IEEE Symposium on Research in Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
20
-
-
47749133330
-
-
Crossbow, "Crossbow," http://www.xbow.com/, 2006.
-
(2006)
Crossbow
-
-
Crossbow1
-
22
-
-
63149186377
-
Performance analysis of proposed key establishment protocols in multi-tiered sensor networks
-
K. Singh and V. Muthukkumarasamy, "Performance analysis of proposed key establishment protocols in multi-tiered sensor networks," Journal of Networks, vol. 3, no. 6, 2008.
-
(2008)
Journal of Networks
, vol.3
, Issue.6
-
-
Singh, K.1
Muthukkumarasamy, V.2
-
23
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
New York, NY, USA: ACM Press
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks," in SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems. New York, NY, USA: ACM Press, 2004, pp. 162-175.
-
(2004)
SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
26
-
-
34247376029
-
-
P. K. Dutta, J. W Hui, D. C. Chu, and D. E. Culler, Securing the deluge network programming system, In the Fifth International Conference on Information Processing in Sensor Networks (IPSN'06), April 2006.
-
P. K. Dutta, J. W Hui, D. C. Chu, and D. E. Culler, "Securing the deluge network programming system," In the Fifth International Conference on Information Processing in Sensor Networks (IPSN'06), April 2006.
-
-
-
-
27
-
-
0004161838
-
Root finding and nonlinear sets of equation
-
W. H. Press, Ed. Cambridge University Press
-
W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery, "Root finding and nonlinear sets of equation," in Numerical Recipes: The Art of Scientific Computing, W. H. Press, Ed. Cambridge University Press, 2007.
-
(2007)
Numerical Recipes: The Art of Scientific Computing
-
-
Press, W.H.1
Teukolsky, S.A.2
Vetterling, W.T.3
Flannery, B.P.4
-
28
-
-
84869272016
-
-
A. Liu, P. Kampanakis, and P. Ning, Tinyecc: Elliptic curve cryptography for sensor networks version 0.3, February 2007
-
A. Liu, P. Kampanakis, and P. Ning, "Tinyecc: Elliptic curve cryptography for sensor networks (version 0.3)," February 2007, http://discovery.csc.ncsu.edu/software/TinyECC/.
-
-
-
|