-
1
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
Oct.-Dec
-
K. Lorincz, D. Malan, T. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton, "Sensor networks for emergency response: challenges and opportunities," IEEE Pervasive Computing, vol. 3, no. 4, pp. 16-23, Oct.-Dec. 2004.
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.2
Fulford-Jones, T.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Welsh, M.8
Moulton, S.9
-
2
-
-
59849115600
-
Body area sensor networks: Challenges and opportunities
-
Jan
-
M. Hanson, H. Powell, A. Barth, K. Ringgenberg, B. Calhoun, J. Aylor, and J. Lach, "Body area sensor networks: Challenges and opportunities," Computer, vol. 42, no. 1, pp. 58-65, Jan. 2009.
-
(2009)
Computer
, vol.42
, Issue.1
, pp. 58-65
-
-
Hanson, M.1
Powell, H.2
Barth, A.3
Ringgenberg, K.4
Calhoun, B.5
Aylor, J.6
Lach, J.7
-
3
-
-
18244373181
-
A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation
-
March
-
E. Jovanov, A. Milenkovic, C. Otto, and P. C. de Groen, "A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation." J Neuroengineering Rehabil, vol. 2, no. 1, March 2005.
-
(2005)
J Neuroengineering Rehabil
, vol.2
, Issue.1
-
-
Jovanov, E.1
Milenkovic, A.2
Otto, C.3
De Groen, P.C.4
-
4
-
-
77953314795
-
Secure device pairing
-
2nd Ed., H. Tilborg and S. Jajodia Ed., Springer, to appear
-
M. Li, W. Lou, and K. Ren, "Secure device pairing," in Encyclopedia of Cryptography and Security (2nd Ed.), H. Tilborg and S. Jajodia Ed., Springer, to appear, 2010.
-
(2010)
Encyclopedia of Cryptography and Security
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
5
-
-
78650421160
-
Gangs: Gather, authenticate 'n group securely
-
C.-H. O. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J. M. McCune, A. Studer, A. Perrig, B.-Y. Yang, and T.-C. Wu, "Gangs: gather, authenticate 'n group securely," in MobiCom '08, 2008, pp. 92-103.
-
(2008)
MobiCom '08
, pp. 92-103
-
-
Chen, C.-H.O.1
Chen, C.-W.2
Kuo, C.3
Lai, Y.-H.4
McCune, J.M.5
Studer, A.6
Perrig, A.7
Yang, B.-Y.8
Wu, T.-C.9
-
6
-
-
33750827765
-
Resource-efficient security for medical body sensor networks
-
April
-
O. Morchon, H. Baldus, and D. Sanchez, "Resource-efficient security for medical body sensor networks," in BSN '06, April 2006, p. 83.
-
(2006)
BSN '06
, pp. 83
-
-
Morchon, O.1
Baldus, H.2
Sanchez, D.3
-
7
-
-
35549002780
-
Addressing security in medical sensor networks
-
K. Malasri and L. Wang, "Addressing security in medical sensor networks," in HealthNet '07, 2007, pp. 7-12.
-
(2007)
HealthNet '07
, pp. 7-12
-
-
Malasri, K.1
Wang, L.2
-
8
-
-
56749165131
-
Body sensor network security: An identity-based cryptography approach
-
C. C. Tan, H. Wang, S. Zhong, and Q. Li, "Body sensor network security: an identity-based cryptography approach," in ACM WiSec '08:, 2008, pp. 148-153.
-
(2008)
ACM WiSec '08
, pp. 148-153
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
9
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
April
-
C. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, April 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.1
Zhang, Y.-T.2
Bao, S.-D.3
-
10
-
-
70349303536
-
Securing body sensor networks: Sensor association and key management
-
S. L. Keoh, E. Lupu, and M. Sloman, "Securing body sensor networks: Sensor association and key management," IEEE PerCom '09, pp. 1-6, 2009.
-
(2009)
IEEE PerCom '09
, pp. 1-6
-
-
Keoh, S.L.1
Lupu, E.2
Sloman, M.3
-
11
-
-
79959884874
-
Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
-
C. Kuo, M. Luk, R. Negi, and A. Perrig, "Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes," in SenSys '07, 2007, pp. 233-246.
-
(2007)
SenSys '07
, pp. 233-246
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
12
-
-
77953320591
-
Kalwen: A new practical and interoperable key management scheme for body sensor networks
-
April 1-3
-
Y. Law, G. Moniava, Z. Gong, P. Hartel, and M. Palaniswami, "Kalwen: A new practical and interoperable key management scheme for body sensor networks," in BodyNets '09, April 1-3 2009.
-
(2009)
BodyNets '09
-
-
Law, Y.1
Moniava, G.2
Gong, Z.3
Hartel, P.4
Palaniswami, M.5
-
13
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. J. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in IWSP '00, 2000, pp. 172-194.
-
(2000)
IWSP '00
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
14
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, "Talking to strangers: authentication in ad-hoc wireless networks," in NDSS '02, 2002.
-
(2002)
NDSS '02
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
15
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
J. M. McCune, A. Perrig, and M. K. Reiter, "Seeing-is-believing: Using camera phones for human-verifiable authentication," in IEEE S & P, 2005, pp. 110-124.
-
(2005)
IEEE S & P
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
16
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
Feb.
-
M. Cagalj, S. Capkun, and J.-P. Hubaux, "Key agreement in peer-to-peer wireless networks," Proceedings of the IEEE, vol. 94, no. 2, pp. 467-478, Feb. 2006.
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
17
-
-
33745832230
-
SAS-based Authenticated Key Agreement
-
Public Key Cryptography - PKC '06, ser.
-
S. Pasini and S. Vaudenay, "SAS-based Authenticated Key Agreement," in Public Key Cryptography - PKC '06, ser. LNCS, vol. 3958, 2006, pp. 395-409.
-
(2006)
LNCS
, vol.3958
, pp. 395-409
-
-
Pasini, S.1
Vaudenay, S.2
-
18
-
-
70450239642
-
Spate: Small-group pki-less authenticated trust establishment
-
Y.-H. Lin, A. Studer, H.-C. Hsiao, J. M. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, and B.-Y. Yang, "Spate: small-group pki-less authenticated trust establishment," in Mobisys '09, 2009, pp. 1-14.
-
(2009)
Mobisys '09
, pp. 1-14
-
-
Lin, Y.-H.1
Studer, A.2
Hsiao, H.-C.3
McCune, J.M.4
Wang, K.-H.5
Krohn, M.6
Lin, P.-L.7
Perrig, A.8
Sun, H.-M.9
Yang, B.-Y.10
-
19
-
-
40249105903
-
SAS-Based Group Authentication and Key Agreement Protocols
-
Public Key Cryptography - PKC '08, ser.
-
S. Laur and S. Pasini, "SAS-Based Group Authentication and Key Agreement Protocols," in Public Key Cryptography - PKC '08, ser. LNCS, 2008, pp. 197-213.
-
(2008)
LNCS
, pp. 197-213
-
-
Laur, S.1
Pasini, S.2
-
20
-
-
0033748607
-
New multiparty authentication services and key agreement protocols
-
Apr
-
G. Ateniese, M. Steiner, and G. Tsudik, "New multiparty authentication services and key agreement protocols," IEEE JSAC, vol. 18, no. 4, pp. 628-639, Apr 2000.
-
(2000)
IEEE JSAC
, vol.18
, Issue.4
, pp. 628-639
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
21
-
-
45749134695
-
Efficient device pairing using human-comparable synchronized audiovisual patterns
-
Applied Cryptography and Network Security (ACNS), ser.
-
R. Prasad and N. Saxena, "Efficient device pairing using human-comparable synchronized audiovisual patterns," in Applied Cryptography and Network Security (ACNS), ser. LNCS, 2008, pp. 328-345.
-
(2008)
LNCS
, pp. 328-345
-
-
Prasad, R.1
Saxena, N.2
-
22
-
-
84885941616
-
Efficient mutual data authentication using manually authenticated strings
-
Springer
-
S. Laur, N. Asokan, and K. Nyberg, "Efficient mutual data authentication using manually authenticated strings," in Cryptology and Network Security. Springer, 2005, pp. 90-107.
-
(2005)
Cryptology and Network Security
, pp. 90-107
-
-
Laur, S.1
Asokan, N.2
Nyberg, K.3
-
23
-
-
35048896826
-
Zrtp: Extensions to rtp for diffiehellman key agreement for srtp draft-zimmermann-avt-zrtp-01
-
March
-
P. Zimmermann, A. Johnston, and J. Callas, "Zrtp: Extensions to rtp for diffiehellman key agreement for srtp draft-zimmermann-avt-zrtp-01," in Internet-draft, March. 2006.
-
(2006)
Internet-draft
-
-
Zimmermann, P.1
Johnston, A.2
Callas, J.3
-
24
-
-
43749092801
-
Provably secure constant round contributory group key agreement in dynamic setting
-
May
-
R. Dutta and R. Barua, "Provably secure constant round contributory group key agreement in dynamic setting," IEEE Trans. on Inf. Theory, vol. 54, no. 5, pp. 2007-2025, May 2008.
-
(2008)
IEEE Trans. on Inf. Theory
, vol.54
, Issue.5
, pp. 2007-2025
-
-
Dutta, R.1
Barua, R.2
-
25
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Springer-Verlag
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in CRYPTO '92. Springer-Verlag, 1993, pp. 471-486.
-
(1993)
CRYPTO '92
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
26
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
27
-
-
0032178082
-
Secure group communications using key graphs
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," SIGCOMM Comput. Commun. Rev., vol. 28, no. 4, pp. 68-79, 1998.
-
(1998)
SIGCOMM Comput. Commun. Rev.
, vol.28
, Issue.4
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
28
-
-
78651534771
-
Multi-sensor context aware clothing
-
K. Van Laerhoven, A. Schmidt, and H.-W. Gellersen, "Multi-sensor context aware clothing," in Wearable Computers, 2002. (ISWC 2002), 2002, pp. 49-56.
-
(2002)
Wearable Computers, 2002. (ISWC 2002)
, pp. 49-56
-
-
Van Laerhoven, K.1
Schmidt, A.2
Gellersen, H.-W.3
-
29
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "Leap: efficient security mechanisms for large-scale distributed sensor networks," in CCS '03, 2003, pp. 62-72.
-
(2003)
CCS '03
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
30
-
-
51249087814
-
Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu and P. Ning, "Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks," in IPSN '08, 2008, pp. 245-256.
-
(2008)
IPSN '08
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
|