메뉴 건너뛰기




Volumn , Issue , 2012, Pages 614-619

Communication security and privacy in pervasive user-centric e-health systems using Digital Rights Management and side channel attacks defense mechanisms

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION SECURITY; DEFENSE MECHANISM; DIGITAL RIGHTS MANAGEMENT; E-HEALTH SYSTEMS; ELLIPTIC CURVE CRYPTOGRAPHY; EMBEDDED DEVICE; HEALTH DATA; PRIVACY AND SECURITY; SECURITY SCHEME; SIDE CHANNEL ATTACK; TRAFFIC ANALYSIS; USER-CENTRIC;

EID: 84863935971     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIT.2012.6210006     Document Type: Conference Paper
Times cited : (3)

References (21)
  • 2
    • 79957882759 scopus 로고    scopus 로고
    • An interoperable security framework for connectedhealthcare
    • M. Asim, M. Petkovic, M. Qu, and C. Wang, "An interoperable security framework for connectedhealthcare," CCNC 2011.
    • CCNC 2011
    • Asim, M.1    Petkovic, M.2    Qu, M.3    Wang, C.4
  • 3
    • 79957905642 scopus 로고    scopus 로고
    • A power efficient MAC protocol for implant device communication in Wireless Body Area Networks
    • MA Ameen, J. Liu, S. Ullah, and K. S. Kwak, "A power efficient MAC protocol for implant device communication in Wireless Body Area Networks," CCNC 2011.
    • CCNC 2011
    • Ameen, M.1    Liu, J.2    Ullah, S.3    Kwak, K.S.4
  • 5
    • 84863940587 scopus 로고    scopus 로고
    • IEEE standard 802.15.4d-2009
    • IEEE standard 802.15.4d-2009.
  • 9
    • 84863977536 scopus 로고    scopus 로고
    • CC2420 Datasheet: http://www-mtl.mit.edu/Courses/6.111/labkit/datasheets/ CC2420.pdf
  • 10
    • 84863910319 scopus 로고    scopus 로고
    • MC1322x Datasheet: http://cache.freescale.com/files/rCi/Jdoc/data-sheet/ MC1322x.pdf
  • 13
    • 67650291019 scopus 로고    scopus 로고
    • Analysis of public-key cryptography for wireless sensor networks security
    • July
    • Amin, F., Jahangir, A. H., & Rasifard, H. (2008). Analysis of Public-Key Cryptography for Wireless Sensor Networks Security. Engineering and Technology, 31(July), 530-535.
    • (2008) Engineering and Technology , vol.31 , pp. 530-535
    • Amin, F.1    Jahangir, A.H.2    Rasifard, H.3
  • 14
    • 84863900320 scopus 로고    scopus 로고
    • Tmote Sky Data Sheet, http://sentilla.com/files/pdfleol/tmote-sky- datasheet.pdf
  • 20
    • 47849117674 scopus 로고    scopus 로고
    • Intellectual property protection using embedded systems
    • IOS Press (Amsterdam, The Netherlands, 2005
    • Fragopoulos, A. & Serpanos D. N. (2005). Intellectual Property Protection Using Embedded Systems, in Security & Embedded Systems, Vol. 2, IOS Press (Amsterdam, The Netherlands, pp. 44-56, 2005.
    • (2005) Security & Embedded Systems , vol.2 , pp. 44-56
    • Fragopoulos, A.1    Serpanos, D.N.2
  • 21
    • 84863945641 scopus 로고    scopus 로고
    • ARTEMIS-2009-1, 100228. The CHIRON project intends to combine state-of-the art technologies and innovative solutions into an integrated framework designed for an effective and person-centric health management along the complete care cycle
    • ARTEMIS-2009-1, 100228, 2010 - 2012: "Cyclic and person-centric Health management: Integrated appRoach for hOme, mobile and clinical eNvironments" (CHIRON). The CHIRON project intends to combine state-of-the art technologies and innovative solutions into an integrated framework designed for an effective and person-centric health management along the complete care cycle. http://www.chiron-project.eu
    • (2010) Cyclic and Person-centric Health Management: Integrated AppRoach for HOme, Mobile and Clinical ENvironments


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.