메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network

Author keywords

[No Author keywords available]

Indexed keywords

BODY AREA NETWORKS; HEALTH MONITORING; KEY-DISTRIBUTION PROTOCOLS; PEER-TO-PEER COMMUNICATIONS; PHYSIOLOGICAL SIGNALS; PRIVATE INFORMATION; RECEIVED SIGNAL STRENGTH INDICES (RSSI); SYMMETRIC CRYPTOGRAPHY;

EID: 84879293203     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2013/912873     Document Type: Article
Times cited : (27)

References (40)
  • 1
    • 84879283119 scopus 로고    scopus 로고
    • Apple inc. http://www.patentlyapple.com/patently-apple/2012/06/ inductively-powered-ring-shines-in-fujitsus-iphone-app-patent.html
    • Apple Inc.
  • 5
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • 2-s2.0-33847120377 10.1145/1218556.1218559
    • Zhu S., Setia S., Jajodia S., LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2006 2 4 500 528 2-s2.0-33847120377 10.1145/1218556.1218559
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 9
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health
    • 2-s2.0-33646948221 10.1109/MCOM.2006.1632652
    • Poon C. C. Y., Zhang Y. T., Bao S. D., A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health. IEEE Communications Magazine 2006 44 4 73 81 2-s2.0-33646948221 10.1109/MCOM.2006. 1632652
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.C.Y.1    Zhang, Y.T.2    Bao, S.D.3
  • 13
    • 30844458593 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • 2-s2.0-30844458593 10.1007/s10623-005-6343-z
    • Juels A., Sudan M., A fuzzy vault scheme. Designs, Codes, and Cryptography 2006 38 2 237 257 2-s2.0-30844458593 10.1007/s10623-005-6343-z
    • (2006) Designs, Codes, and Cryptography , vol.38 , Issue.2 , pp. 237-257
    • Juels, A.1    Sudan, M.2
  • 16
    • 85009094437 scopus 로고    scopus 로고
    • Channel model for body area network (ban), ieee p802. 15-08-0780-09-0006
    • Yazdandoost K., Sayrafian K., Channel model for body area network (ban), ieee p802. 15-08-0780-09-0006. Working Group Document 2009 IEEE 802.15
    • (2009) Working Group Document , Issue.IEEE 802.15
    • Yazdandoost, K.1    Sayrafian, K.2
  • 20
    • 70549113407 scopus 로고    scopus 로고
    • Temporal correlation of dynamic on-body area radio channel
    • 2-s2.0-70549113407 10.1049/el.2009.2057
    • Smith D. B., Zhang J., Hanlen L. W., Miniutti D., Rodda D., Gilbert B., Temporal correlation of dynamic on-body area radio channel. Electronics Letters 2009 45 24 1212 1213 2-s2.0-70549113407 10.1049/el.2009.2057
    • (2009) Electronics Letters , vol.45 , Issue.24 , pp. 1212-1213
    • Smith, D.B.1    Zhang, J.2    Hanlen, L.W.3    Miniutti, D.4    Rodda, D.5    Gilbert, B.6
  • 22
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • 2-s2.0-28644438588 10.1109/TAP.2005.858853
    • Aono T., Higuchi K., Ohira T., Komiyama B., Sasaoka H., Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation 2005 53 11 3776 3784 2-s2.0-28644438588 10.1109/TAP.2005.858853
    • (2005) IEEE Transactions on Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 27
    • 0003822632 scopus 로고    scopus 로고
    • A statistical test suite for random and pseudorandom number generators for cryptographic applications
    • Rukhin A., Soto J., Nechvatal J., Smid M., Barker E., A statistical test suite for random and pseudorandom number generators for cryptographic applications. DTIC Document 2001
    • (2001) DTIC Document
    • Rukhin, A.1    Soto, J.2    Nechvatal, J.3    Smid, M.4    Barker, E.5
  • 31
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • 2-s2.0-0029234878 10.1109/26.385951
    • Hershey J. E., Hassan A. A., Yarlagadda R., Unconventional cryptographic keying variable management. IEEE Transactions on Communications 1995 43 1 3 6 2-s2.0-0029234878 10.1109/26.385951
    • (1995) IEEE Transactions on Communications , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.E.1    Hassan, A.A.2    Yarlagadda, R.3
  • 32
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • 2-s2.0-0027599802 10.1109/18.256484
    • Maurer U. M., Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory 1993 39 3 733 742 2-s2.0-0027599802 10.1109/18.256484
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 33
  • 34
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • 2-s2.0-72249083097 10.1109/TMC.2009.88
    • Patwari N., Croft J., Jana S., Kasera S. K., High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing 2010 9 1 17 30 2-s2.0-72249083097 10.1109/TMC.2009.88
    • (2010) IEEE Transactions on Mobile Computing , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.