-
1
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. CRYPTO, 2001, pp. 213-229.
-
(2001)
Proc. CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
33750836005
-
Key technical challenges and current implementations of body sensor networks
-
B. Lo and G. Z. Yang, "Key technical challenges and current implementations of body sensor networks," in Proc. Body Sensor Networks (BSN), 2005, pp. 1-5.
-
(2005)
Proc. Body Sensor Networks (BSN)
, pp. 1-5
-
-
Lo, B.1
Yang, G.Z.2
-
3
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Math. Comput., vol.48, pp. 203-209, 1987.
-
(1987)
Math. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
4
-
-
33750795341
-
A phone-centered body sensor network platform: Cost, energy efficiency and user interface
-
L. Zhong, M. Sinclair, and R. Bittner, "A phone-centered body sensor network platform: Cost, energy efficiency and user interface," in Proc. BSN, 2006, pp. 179-182.
-
(2006)
Proc. BSN
, pp. 179-182
-
-
Zhong, L.1
Sinclair, M.2
Bittner, R.3
-
5
-
-
20544447851
-
-
presented at the BSN, London, U.K.
-
D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton, "Codeblue: An ad hoc sensor network infrastructure for emergency medical care," presented at the BSN, London, U.K., 2004.
-
(2004)
Codeblue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care
-
-
Malan, D.1
Fulford-Jones, T.2
Welsh, M.3
Moulton, S.4
-
6
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
C. Cocks, "An identity based encryption scheme based on quadratic residues," in Proc. LNCS, 2001, vol.2260, pp. 360-363.
-
(2001)
Proc. LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
7
-
-
33144476837
-
Location-based compromisetolerant security mechanisms forwireless sensor networks
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromisetolerant security mechanisms forwireless sensor networks," in Proc. IEEE J. Sel. Areas Commun., 2006, pp. 247-260.
-
(2006)
Proc. IEEE J. Sel. Areas Commun.
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
8
-
-
46849122785
-
Efficient implementation of public key cryptosystems on mote sensors (short paper)
-
presented at the Raleigh, NC
-
H.Wang and Q. Li, "Efficient implementation of public key cryptosystems on mote sensors (short paper)," presented at the Int. Conf. Inf. Commun. Security (ICICS), Raleigh, NC, 2006.
-
(2006)
Int. Conf. Inf. Commun. Security (ICICS)
-
-
Wang, H.1
Li, Q.2
-
9
-
-
49949083706
-
Elliptic curve cryptography based access control in sensor networks
-
H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography based access control in sensor networks," Int. J. Security Netw., vol. 1, no. 3/4, pp. 127- 137, 2006.
-
(2006)
Int. J. Security Netw.
, vol.1
, Issue.3-4
, pp. 127-137
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
10
-
-
51849154205
-
Comparing symmetric-key and public-key schemes in sensor networks
-
H.Wang, B. Sheng, C. C. Tan, and Q. Li, "Comparing symmetric-key and public-key schemes in sensor networks," in Proc. IEEE ICDCS, 2008, pp. 11-18.
-
(2008)
Proc. IEEE ICDCS
, pp. 11-18
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
-
11
-
-
27144464694
-
A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care
-
M. Mont, P. Bramhall, and K. Harrison, "A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care," in Proc. Int. Workshop Database Expert Syst. Appl., 2003, pp. 432-437.
-
(2003)
Proc. Int. Workshop Database Expert Syst. Appl.
, pp. 432-437
-
-
Mont, M.1
Bramhall, P.2
Harrison, K.3
-
13
-
-
70449604158
-
A new symmetric cryptosystem of body area sensor networks for telemedicine
-
S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, "A new symmetric cryptosystem of body area sensor networks for telemedicine," in Proc. Conf. Jpn. Soc. Med. Electron. Biol. Eng., 2005, p. 654.
-
(2005)
Proc. Conf. Jpn. Soc. Med. Electron. Biol. Eng.
, pp. 654
-
-
Bao, S.-D.1
Zhang, Y.-T.2
Shen, L.-F.3
-
14
-
-
33846925115
-
Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems
-
S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, "Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems," in Proc. IEEE Eng. Med. Biol., 2005, pp. 2455-2458.
-
(2005)
Proc. IEEE Eng. Med. Biol.
, pp. 2455-2458
-
-
Bao, S.-D.1
Zhang, Y.-T.2
Shen, L.-F.3
-
15
-
-
56749165131
-
Body sensor network security: An identity-based cryptography approach
-
C. C. Tan, H. Wang, S. Zhong, and Q. Li, "Body sensor network security: An identity-based cryptography approach," in ACM Conf. Wireless Security (WiSec), 2008, pp. 148-153.
-
(2008)
ACM Conf. Wireless Security (WiSec)
, pp. 148-153
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
|