메뉴 건너뛰기




Volumn 17, Issue 1, 2010, Pages 51-58

Data security and privacy in wireless body area networks

Author keywords

[No Author keywords available]

Indexed keywords

BODY PARAMETERS; COMPUTER ASSISTED; DATA SECURITY; DATA SECURITY AND PRIVACY; DISTRIBUTED DATA; DISTRIBUTED DATA ACCESS; E-HEALTHCARE; HEALTHCARE QUALITY; HIGH DEMAND; IMPLANTABLE SENSORS; MEDICAL DATA; NEW TECHNOLOGIES; PRACTICAL ISSUES; RESOURCE CONSTRAINT; RESPONSE SYSTEMS; SECURITY AND PRIVACY; SECURITY AND PRIVACY PROTECTION; SHORT-RANGE WIRELESS COMMUNICATIONS; UBIQUITOUS HEALTH MONITORING; WIRELESS BODY AREA NETWORK;

EID: 77649094379     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2010.5416350     Document Type: Article
Times cited : (512)

References (15)
  • 1
    • 18244373181 scopus 로고    scopus 로고
    • A Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation
    • Mar
    • E. Jovanov et al., "A Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation," J. Neuro Eng. Rehab., vol. 2, no. 6, Mar. 2005.
    • (2005) J. Neuro Eng. Rehab , vol.2 , Issue.6
    • Jovanov, E.1
  • 2
    • 38349178199 scopus 로고    scopus 로고
    • Security and Privacy for Implantable Medical Devices
    • Jan
    • D. Halperin et al., "Security and Privacy for Implantable Medical Devices," IEEE Pervasive Comp., vol. 7, no. 1, Jan. 2008, pp. 30-39.
    • (2008) IEEE Pervasive Comp , vol.7 , Issue.1 , pp. 30-39
    • Halperin, D.1
  • 3
    • 10944253573 scopus 로고    scopus 로고
    • Sensor Networks for Emergency Response: Challenges and Opportunities
    • Oct.-Dec
    • K. Lorincz et al., "Sensor Networks for Emergency Response: Challenges and Opportunities," IEEE Pervasive Comp., vol. 3, no. 4, Oct.-Dec. 2004, pp. 16-23.
    • (2004) IEEE Pervasive Comp , vol.3 , Issue.4 , pp. 16-23
    • Lorincz, K.1
  • 4
    • 77649092026 scopus 로고    scopus 로고
    • The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule; http://www.hhs.gov/ocr/privacy/
    • The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule; http://www.hhs.gov/ocr/privacy/
  • 5
    • 1542300188 scopus 로고    scopus 로고
    • Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks
    • June
    • S. Chessa and P. Maestrini, "Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks," Int'l. Conf. Dependable Sys. Net., June 2003, pp. 207-16.
    • (2003) Int'l. Conf. Dependable Sys. Net , pp. 207-216
    • Chessa, S.1    Maestrini, P.2
  • 6
    • 70349659577 scopus 로고    scopus 로고
    • Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
    • Apr
    • Q. Wang et al., "Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance," Proc. IEEE INFOCOM '09, Apr. 2009.
    • (2009) Proc. IEEE INFOCOM '09
    • Wang, Q.1
  • 7
    • 49149089237 scopus 로고    scopus 로고
    • Catch Me (If You Can): Data Survival in Unattended Sensor Networks
    • Mar
    • R. Di Pietro et al., "Catch Me (If You Can): Data Survival in Unattended Sensor Networks," Proc. IEEE PerCom, Mar. 2008, pp. 185-94.
    • (2008) Proc. IEEE PerCom , pp. 185-194
    • Di Pietro, R.1
  • 11
    • 77649141255 scopus 로고    scopus 로고
    • Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
    • Sept
    • S. Yu et al., "Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems," SecureComm 2009, Sept. 2009.
    • (2009) SecureComm 2009
    • Yu, S.1
  • 12
    • 70349682512 scopus 로고    scopus 로고
    • FDAC: Toward Finegrained Distributed Data Access Control in Wireless Sensor Networks
    • Apr
    • S. Yu, K. Ren, and W. Lou, "FDAC: Toward Finegrained Distributed Data Access Control in Wireless Sensor Networks," IEEE INFOCOM '09, Apr. 2009.
    • (2009) IEEE INFOCOM '09
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 13
    • 84934300668 scopus 로고    scopus 로고
    • Computing Cryptographic Algorithms in Portable and Embedded Devices
    • May
    • A. Ramachandran, Z. Zhou, and D. Huang, "Computing Cryptographic Algorithms in Portable and Embedded Devices," IEEE PORTABLE '07, May 2007, pp. 1-7.
    • (2007) IEEE PORTABLE '07 , pp. 1-7
    • Ramachandran, A.1    Zhou, Z.2    Huang, D.3
  • 14
    • 45749094622 scopus 로고    scopus 로고
    • Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
    • May
    • T. Nishide, K. Yoneyama and K. Ohta, "Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures," Proc. LNCS Applied Cryptography Net. Security, May 2008, pp. 111-29.
    • (2008) Proc. LNCS Applied Cryptography Net. Security , pp. 111-129
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 15
    • 70349658629 scopus 로고    scopus 로고
    • DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks
    • Apr
    • R. Zhang, Y. Zhang, and K. Ren, "DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks," Proc. IEEE INFOCOM '09, Apr. 2009.
    • (2009) Proc. IEEE INFOCOM '09
    • Zhang, R.1    Zhang, Y.2    Ren, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.