메뉴 건너뛰기




Volumn , Issue , 2012, Pages 118-121

An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem

Author keywords

Body Sensor Network; Elliptic Curve Cryptography; Rekeying; Session Key

Indexed keywords

AUTHENTICATED KEY AGREEMENT; COMMUNICATION OVERHEADS; COMPUTATION COSTS; CRYPTOGRAPHIC TECHNIQUES; ELLIPTIC CURVE CRYPTOGRAPHY; HEALTH DATA; KEY MANAGEMENT; MEMORY REQUIREMENTS; PERSONAL HEALTH; RE-KEYING; SESSION KEY;

EID: 84863110431     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNSC.2012.6204902     Document Type: Conference Paper
Times cited : (17)

References (13)
  • 1
    • 16644374371 scopus 로고    scopus 로고
    • Establishing Pair wise Keys in Distributed Sensor Networks
    • Feb
    • Liu, P. Ning, and R. Li, "Establishing Pair wise Keys in Distributed Sensor Networks," ACM Trans. on Information and System Security, vol. 8, no. 1, pp. 41 - 77, Feb 2005.
    • (2005) ACM Trans. on Information and System Security , vol.8 , Issue.1 , pp. 41-77
    • Liu1    Ning, P.2    Li, R.3
  • 3
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health
    • C. C. Y. Poon, Y. T. Zhang, and S. D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health," IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, 2006.
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.C.Y.1    Zhang, Y.T.2    Bao, S.D.3
  • 5
    • 33646948221 scopus 로고    scopus 로고
    • A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and M-Health
    • C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, "A Novel Biometrics Method To Secure Wireless Body Area Sensor Networks for Telemedicine And M-Health," IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, 2006.
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.C.Y.1    Zhang, Y.-T.2    Bao, S.-D.3
  • 10
    • 27244436587 scopus 로고    scopus 로고
    • Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
    • August
    • N. Gura, A. Patel, A. Wander, H. Eberle, S. Chang Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs", CHES, August 2004.
    • (2004) CHES
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Chang Shantz, S.5
  • 11
    • 70350464378 scopus 로고    scopus 로고
    • Using trust for key distribution and route selection in wireless sensor networks
    • Nov.
    • N. Lewis, N. Foukia, "Using trust for key distribution and route selection in wireless sensor networks," IEEE Globecom, pp.16-30, Nov. 2007.
    • (2007) IEEE Globecom , pp. 16-30
    • Lewis, N.1    Foukia, N.2
  • 13
    • 56749181478 scopus 로고    scopus 로고
    • Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
    • M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, "Emergent properties: detection of the node-capture attack in mobile wireless sensor networks" In WiSec 2008.
    • WiSec 2008
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3    Mei, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.