-
1
-
-
33745853759
-
Security issues of wireless sensor networks in healthcare applications
-
April
-
H. S. Ng, M. L. Sim, and C. M. Tan, "Security issues of wireless sensor networks in healthcare applications," BT Technology Journal, vol. 24, pp. 138-144, April 2006.
-
(2006)
BT Technology Journal
, vol.24
, pp. 138-144
-
-
Ng, H.S.1
Sim, M.L.2
Tan, C.M.3
-
2
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, no. 12, pp. 993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
3
-
-
80052141930
-
BLIG: A New Approach for Sensor Identification, Grouping, and Authorisation in Body Sensor Networks
-
J. Andersen and J. E. Bardram, "BLIG: A New Approach for Sensor Identification, Grouping, and Authorisation in Body Sensor Networks ," in Proc. 4th Int. Workshop on Wearable and Implantable Body Sensor Networks, Aachen, Germany, March 26 - 28, 2007.
-
Proc. 4th Int. Workshop on Wearable and Implantable Body Sensor Networks, Aachen, Germany, March 26 - 28, 2007
-
-
Andersen, J.1
Bardram, J.E.2
-
4
-
-
16644374371
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
Feb
-
D. Liu, P. Ning, and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks," ACM Trans. on Information and System Security, vol. 8, no. 1, pp. 41 - 77, Feb 2005.
-
(2005)
ACM Trans. on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
5
-
-
33749033368
-
Group-Based Key Pre-Distribution in Wireless Sensor Networks
-
D. Liu, P. Ning, and W. Du, "Group-Based Key Pre-Distribution in Wireless Sensor Networks," in Proc. ACM Workshop on Wireless Security (WiSe 2005), 2005, pp. 11-20.
-
Proc. ACM Workshop on Wireless Security (WiSe 2005), 2005
, pp. 11-20
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
7
-
-
35248853846
-
An Efficient Scheme for User Authentication in Wireless Sensor Networks
-
Washington, DC, USA: IEEE Computer Society
-
C. Jiang, B. Li, and H. Xu, "An Efficient Scheme for User Authentication in Wireless Sensor Networks," in Proc. 21st Int. Conf. on Advanced Information Networking and Applications Workshops. Washington, DC, USA: IEEE Computer Society, 2007.
-
(2007)
Proc. 21st Int. Conf. on Advanced Information Networking and Applications Workshops
-
-
Jiang, C.1
Li, B.2
Xu, H.3
-
9
-
-
33746093936
-
-
Dept. of Computer Science, College of William and Mary, Tech. Rep. WM-CS-2005-12, October
-
H. Wang, B. Sheng, and Q. Li, "TelosB Implementation of Elliptic Curve Cryptography over Primary Field," Dept. of Computer Science, College of William and Mary, Tech. Rep. WM-CS-2005-12, October 2005.
-
(2005)
TelosB Implementation of Elliptic Curve Cryptography over Primary Field
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
10
-
-
56749165131
-
Body sensor network security: An identity-based cryptography approach
-
New York, NY, USA: ACM
-
C. C. Tan, H. Wang, S. Zhong, and Q. Li, "Body sensor network security: an identity-based cryptography approach," in Proc. of 1st ACM conference on Wireless network security. New York, NY, USA: ACM, 2008, pp. 148-153.
-
(2008)
Proc. of 1st ACM Conference on Wireless Network Security
, pp. 148-153
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
11
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
Washington DC, USA: ACM
-
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, "TinyPK: securing sensor networks with public key technology," in Proc. 2nd ACM workshop on Security of ad hoc and sensor networks. Washington DC, USA: ACM, 2004, pp. 59-64.
-
(2004)
Proc. 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Fen Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
13
-
-
49149121092
-
Clustering Oriented Architectures in Medical Sensor Environments
-
E. Klaoudatou, E. Konstantinou, G. Kambourakis, and S. Gritzalis, "Clustering Oriented Architectures in Medical Sensor Environments," in Proc. 3rd International Conference on Availability, Reliability and Security (ARES), 4-7 March, 2008, pp. 929 - 934.
-
Proc. 3rd International Conference on Availability, Reliability and Security (ARES), 4-7 March, 2008
, pp. 929-934
-
-
Klaoudatou, E.1
Konstantinou, E.2
Kambourakis, G.3
Gritzalis, S.4
-
15
-
-
0019634370
-
Password Authentication with Insecure Communication
-
L. Lamport, "Password Authentication with Insecure Communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
16
-
-
0242426103
-
The TESLA Broadcast Authentication Protocol
-
A. Perrig, R. Canetti, J. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol," RSA Cryptobytes, 2002.
-
(2002)
RSA Cryptobytes
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
17
-
-
1642319117
-
-
Certicom Research, Tech. Rep., September [Online]. Available
-
"SEC 2: Recommended Elliptic Curve Domain Parameters," Standards for Efficient Cryptography (SEC), Certicom Research, Tech. Rep., September 2000. [Online]. Available: http://www.secg.org/collateral/sec2 final.pdf
-
(2000)
SEC 2: Recommended Elliptic Curve Domain Parameters
-
-
-
18
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
Baltimore, MD, USA: ACM
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," in Proc. 2nd Int. Conf. on Embedded Networked Sensor Systems. Baltimore, MD, USA: ACM, 2004, pp. 162-175.
-
(2004)
Proc. 2nd Int. Conf. on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
19
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Comput. Syst., vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
|