-
1
-
-
33745853759
-
Security issues of wireless sensor networks in healthcare applications
-
H. S. Ng, M. L. Sim, C. M. Tan. Security issues of wireless sensor networks in healthcare applications. BT Tech. Journal, Vol. 24 No 2, 2006, pp. 138 - 144,
-
(2006)
BT Tech. Journal
, vol.24
, Issue.2
, pp. 138-144
-
-
Ng, H.S.1
Sim, M.L.2
Tan, C.M.3
-
2
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
DOI 10.1109/MPRV.2004.18
-
K. Lorincz, D. Malan, T. F. Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, S. Moulton, M. Welsh, Sensor Networks for Emergency Response: Challenges and Opportunities, IEEE Pervasive Computing, Oct/Dec, 2004, pp. 16-23. (Pubitemid 40010894)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.J.2
Fulford-Jones, T.R.F.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Welsh, M.8
Moulton, S.9
-
3
-
-
84863243575
-
-
http://fiji.eecs.harvard.edu/CodeBlue
-
-
-
-
4
-
-
48349085134
-
Platform Design for Health-care Monitoring Applications
-
R. Jafari, R.Bajcsy, S. Glaser, B. Gnade, M. Sgroi, S. Sastry. Platform Design for Health-care Monitoring Applications, Joint Workshop on High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability, June 2007, Boston, MA.
-
Joint Workshop on High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability, June 2007, Boston, MA
-
-
Jafari, R.1
Bajcsy, R.2
Glaser, S.3
Gnade, B.4
Sgroi, M.5
Sastry, S.6
-
5
-
-
84863244065
-
-
http://bsn.citris.berkeley.edu/home/
-
-
-
-
6
-
-
84863268563
-
-
http://web.mit.edu/wockets/
-
-
-
-
7
-
-
84863243574
-
-
http://smart.csail.mit.edu/
-
-
-
-
8
-
-
84863243573
-
-
http://www.mobihealth.org/
-
-
-
-
9
-
-
84863244064
-
-
http://www.doc.ic.ac.uk/vip/ubimon/home/index.html
-
-
-
-
10
-
-
34247399967
-
Sensor Networks, Wearable Computing, and Healthcare Applications
-
April-June
-
Trossen, D.; Pavel, D.; Sensor Networks, Wearable Computing, and Healthcare Applications. IEEE Pervasive Computing. Vol. 6(2), April-June 2007, pp.58 - 61.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.2
, pp. 58-61
-
-
Trossen, D.1
Pavel, D.2
-
11
-
-
67349129674
-
A secure mobile healthcare system using trust-based multicast scheme
-
Boukerche, A.; Yonglin R. A secure mobile healthcare system using trust-based multicast scheme. IEEE J. Selected Areas Comm., vol 27(4), 2009 pp:387 - 399.
-
(2009)
IEEE J. Selected Areas Comm.
, vol.27
, Issue.4
, pp. 387-399
-
-
Boukerche, A.1
Yonglin, R.2
-
13
-
-
38049136820
-
Towards a Security Policy for Ubiquitous Healthcare Systems
-
J. Kim, A. R. Beresford, and F. Stajano, Towards a Security Policy for Ubiquitous Healthcare Systems, Proc. 1st International Conference on Ubiquitous Convergence Technology, pp. 263-272, 2006.
-
(2006)
Proc. 1st International Conference on Ubiquitous Convergence Technology
, pp. 263-272
-
-
Kim, J.1
Beresford, A.R.2
Stajano, F.3
-
14
-
-
33846925115
-
Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems
-
S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems, Proc. 27th Annual International Conference of Engineering in Medicine and Biology Society, pp. 2455-2458, 2005.
-
(2005)
Proc. 27th Annual International Conference of Engineering in Medicine and Biology Society
, pp. 2455-2458
-
-
Bao, S.-D.1
Zhang, Y.-T.2
Shen, L.-F.3
-
16
-
-
67349259247
-
Secure mobile health systems: Principles and solutions
-
Kluwer Academic Publishers
-
M. Markovic, Z. Savic, and B. Kovacevic, Secure mobile health systems: principles and solutions, M-Health: Emerging Mobile Health Systems, Kluwer Academic Publishers, pp. 81-106, 2007.
-
(2007)
M-Health: Emerging Mobile Health Systems
, pp. 81-106
-
-
Markovic, M.1
Savic, Z.2
Kovacevic, B.3
-
17
-
-
35048846150
-
Network and Application Security in Mobile e-Health Applications
-
R. Marti, J. Delgado, and X. Perramon, Network and Application Security in Mobile e-Health Applications, Proc. International Conference on Networking Technologies for Broadband and Mobile Networks, pp.995-1004, 2004
-
(2004)
Proc. International Conference on Networking Technologies for Broadband and Mobile Networks
, pp. 995-1004
-
-
Marti, R.1
Delgado, J.2
Perramon, X.3
-
18
-
-
74549125519
-
An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve Cryptography
-
December in press.
-
X.H. Le, S. Lee, I. Butun, M. Khalid, R. Sankar, M. Kim, M-H. Han, Y-K. Lee, H. Lee. An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve Cryptography. Journal of Communications and Networks, Special Issues on Secure Wireless Networking, December 2009 (in press).
-
(2009)
Journal of Communications and Networks, Special Issues on Secure Wireless Networking
-
-
Le, X.H.1
Lee, S.2
Butun, I.3
Khalid, M.4
Sankar, R.5
Kim, M.6
Han, M.-H.7
Lee, Y.-K.8
Lee, H.9
-
19
-
-
67349219359
-
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
-
May
-
Huang, Y.M.; Hsieh, M.Y.; Chao, H.C.; Hung, S.H.; Park, J.H. Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE Journal on Selected Areas in Communications, Vol. 27, No 4, May 2009.
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
-
-
Huang, Y.M.1
Hsieh, M.Y.2
Chao, H.C.3
Hung, S.H.4
Park, J.H.5
-
20
-
-
49949083706
-
Elliptic curve cryptography-based access control in sensor networks
-
Wang, H., Sheng, B., Li, Q.: Elliptic curve cryptography-based access control in sensor networks, Int. J. Security and Networks, Vol. 1, Nos. 3/4, pp.127-137 (2006).
-
(2006)
Int. J. Security and Networks
, vol.1
, Issue.3-4
, pp. 127-137
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
21
-
-
32844459414
-
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
-
Du, W.; Deng, J.; Han, Y.; Varshney, P. A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Trans. Depend. Secure 2006, 3, 62-77.
-
(2006)
IEEE Trans. Depend. Secure
, vol.3
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
22
-
-
77952655038
-
A Secure Coordination - Based Data Dissemination for Mobile sinks in Sensor Networks
-
X-H. Le, S. Lee, Y-K. Lee, H. Lee. A Secure Coordination - based Data Dissemination for Mobile sinks in Sensor Networks. IEICE Transaction on Communication, 2009, Vol E92-B(01).
-
(2009)
IEICE Transaction on Communication
, vol.E92-B
, Issue.1
-
-
Le, X.-H.1
Lee, S.2
Lee, Y.-K.3
Lee, H.4
-
23
-
-
58149190051
-
An Energy- Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks using Deploying Knowledge
-
X-H. Le, N. Canh, S. Lee, Y-K. Lee, H. Lee. An Energy- Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks using Deploying Knowledge. Journal of Sensor, Special Issue "Wireless Sensor Technologies and Applications", 2008, Vol.8(12) pp. 7753-7782.
-
(2008)
Journal of Sensor, Special Issue "Wireless Sensor Technologies and Applications"
, vol.8
, Issue.12
, pp. 7753-7782
-
-
Le, X.-H.1
Canh, N.2
Lee, S.3
Lee, Y.-K.4
Lee, H.5
-
24
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
Karlof, C.; Sastry, N.; Dagner, D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys04), Baltimore, Maryland, November 2004; pp. 162-175.
-
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys04), Baltimore, Maryland, November 2004
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Dagner, D.3
-
25
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
DOI 10.1145/1218556.1218559
-
Zhu, S.; Setia, S.; Jajodia, S. LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Trans. Sens. Netw. 2006, 2, 500-528. (Pubitemid 46278640)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
26
-
-
35248831758
-
Cryptanalysis of SAFER++
-
Alex Biryukov
-
Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz: Cryptanalysis of SAFER++. CRYPTO 2003: 195-211.
-
CRYPTO 2003
, pp. 195-211
-
-
De Cannière, C.1
Dellkrantz, G.2
-
27
-
-
35048818581
-
Comparing Elliptic Curve Cryptography and RSA on 8-it CPUs
-
CHES 2004
-
Gura,N., Patel, A., Wander, A., Eberle, H., Shantz,S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-it CPUs. In CHES 2004, Vol. 3156, LNCS, pp.119-132.
-
LNCS
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
28
-
-
84863289658
-
On the Security of 1024- Bit RSA and 160-bit Elliptic Curve Cryptography
-
ePrint Archive: Report 2009/389
-
Joppe W. Bos, Marcelo K., Thorsten Kleinjung, Arjen K. Lenstra and Peter L. Montgomery: On the Security of 1024- bit RSA and 160-bit Elliptic Curve Cryptography Cryptology. ePrint Archive: Report 2009/389.
-
Cryptology
-
-
Bos, J.W.1
Marcelo, K.2
Kleinjung, T.3
Lenstra, A.K.4
Montgomery, P.L.5
-
29
-
-
0000838441
-
Use of elliptic curves in cryptography
-
V. Miller, Use of elliptic curves in cryptography, CRYPTO 85, 1985.
-
(1985)
CRYPTO 85
-
-
Miller, V.1
-
30
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, Elliptic curve cryptosystems, in Mathematics of Computation 48, 1987, pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
|