-
2
-
-
0034772382
-
Research challenges in wireless networks of biomedical sensors
-
L. Schwiebert, S. Gupta, and J. Weinmann, "Research challenges in wireless networks of biomedical sensors," in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, 2001, pp. 151-165.
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
, pp. 151-165
-
-
Schwiebert, L.1
Gupta, S.2
Weinmann, J.3
-
3
-
-
0036356471
-
Body area network (BAN) - A key infrastructure element for patientcentered medical applications
-
R. Schmidt, T. Norgall, J. Mörsdorf, J. Bernhard, and T. von der Gr̈un, "Body area network (BAN) - a key infrastructure element for patientcentered medical applications," Biomedizinische Technik/Biomedical Engineering, vol. 47, no. s1a, pp. 365-368, 2002.
-
(2002)
Biomedizinische Technik/Biomedical Engineering
, vol.47
, Issue.S1A
, pp. 365-368
-
-
Schmidt, R.1
Norgall, T.2
Mörsdorf, J.3
Bernhard, J.4
Gr̈un Der T.Von5
-
4
-
-
77951003031
-
Potential and challenges of body area networks for personal health
-
J. Penders, J. vande Molengraft, L. Brown, B. Grundlehner, B. Gyselinckx, and C. V. Hoof, "Potential and challenges of body area networks for personal health," in Engineering in Medicine and Biology Society, 2009, pp. 6569-6572.
-
(2009)
Engineering in Medicine and Biology Society
, pp. 6569-6572
-
-
Penders, J.1
Molengraft Vande, J.2
Brown, L.3
Grundlehner, B.4
Gyselinckx, B.5
Hoof, V.C.6
-
5
-
-
81155138997
-
Interoperable medical devices
-
K. Venkatasubramanian, S. Gupta, R. Jetley, and P. Jones, "Interoperable medical devices," IEEE Pulse, vol. 1, no. 2, pp. 16-27, 2010.
-
(2010)
IEEE Pulse
, vol.1
, Issue.2
, pp. 16-27
-
-
Venkatasubramanian, K.1
Gupta, S.2
Jetley, R.3
Jones, P.4
-
6
-
-
79956094375
-
Body area networks: A survey
-
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. Leung, "Body area networks: a survey," Mobile Networks and Applications, vol. 16, no. 2, pp. 171-193, 2011.
-
(2011)
Mobile Networks and Applications
, vol.16
, Issue.2
, pp. 171-193
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.5
-
7
-
-
78650759211
-
Plethysmogrambased secure inter-sensor communication in body area networks
-
K. Venkatasubramanian, A. Banerjee, and S. Gupta, " Plethysmogrambased secure inter-sensor communication in body area networks," in Military Communications Conference, 2008, pp. 1-7.
-
(2008)
Military Communications Conference
, pp. 1-7
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.3
-
8
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in ACM CCS, 2002, pp. 41-47.
-
(2002)
ACM CCS
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
9
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 2, no. 4, pp. 500-528, 2006.
-
(2006)
ACM Transactions on Sensor Networks (TOSN)
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
10
-
-
44149083595
-
SBK: A self-configuring framework for bootstrapping keys in sensor networks
-
F. Liu, X. Cheng, L. Ma, and K. Xing, "SBK: A self-configuring framework for bootstrapping keys in sensor networks," IEEE Transactions on Mobile Computing, vol. 7, no. 7, pp. 858-868, 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.7
, pp. 858-868
-
-
Liu, F.1
Cheng, X.2
Ma, L.3
Xing, K.4
-
11
-
-
38349093891
-
LKE: A self-configuring scheme for locationaware key establishment in wireless sensor networks
-
January
-
F. Liu and X. Cheng, "LKE: A self-configuring scheme for locationaware key establishment in wireless sensor networks," IEEE Transaction on Wireless Communications, vol. 7, no. 1, pp. 224-232, January 2008.
-
(2008)
IEEE Transaction on Wireless Communications
, vol.7
, Issue.1
, pp. 224-232
-
-
Liu, F.1
Cheng, X.2
-
12
-
-
34548205306
-
IPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks
-
August
-
L. Ma, X. Cheng, F. Liu, F. An, and M. Rivera, "iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 8, pp. 1174-1184, August 2007.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.8
, pp. 1174-1184
-
-
Ma, L.1
Cheng, X.2
Liu, F.3
An, F.4
Rivera, M.5
-
13
-
-
76849098534
-
PSKA: Usable and secure key agreement scheme for body area networks
-
K. Venkatasubramanian, A. Banerjee, and S. Gupta, "PSKA: Usable and secure key agreement scheme for body area networks," IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 60-68, 2010.
-
(2010)
IEEE Transactions on Information Technology in Biomedicine
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.3
-
14
-
-
62349117384
-
EKG-based key agreement in body sensor networks
-
K. Venkatasubramanian, A. Banerjee, and S. Gupta, "EKG-based key agreement in body sensor networks," in In Proceedings of the 2nd Workshop on Mission Critical Networks, 2008, pp. 1-6.
-
(2008)
Proceedings of the 2nd Workshop on Mission Critical Networks
, pp. 1-6
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.3
-
15
-
-
56749165131
-
Body sensor network security: An identity-based cryptography approach
-
C. Tan, H.Wang, S. Zhong, and Q. Li, "Body sensor network security: an identity-based cryptography approach," in ACM Wisec, 2008, pp. 148-153.
-
(2008)
ACM Wisec
, pp. 148-153
-
-
Tan, C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
16
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
D. Malan, M. Welsh, and M. Smith, "A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography," in IEEE SECON, 2004, pp. 71-80.
-
(2004)
IEEE SECON
, pp. 71-80
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
-
17
-
-
70449562519
-
IBE-Lite: A lightweight identitybased cryptography for body sensor networks
-
C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-Lite: a lightweight identitybased cryptography for body sensor networks," IEEE Transactions on Information Technology in Biomedicine,, vol. 13, no. 6, pp. 926-932, 2009.
-
(2009)
IEEE Transactions on Information Technology in Biomedicine
, vol.13
, Issue.6
, pp. 926-932
-
-
Tan, C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
18
-
-
70349303536
-
Securing body sensor networks: Sensor association and key management
-
S. Keoh, E. Lupu, and M. Sloman, "Securing body sensor networks: Sensor association and key management," in IEEE PerCom, 2009, pp. 1-6.
-
(2009)
IEEE PerCom
, pp. 1-6
-
-
Keoh, S.1
Lupu, E.2
Sloman, M.3
-
19
-
-
77953304550
-
Group device pairing based secure sensor association and key management for body area networks
-
M. Li, S. Yu, W. Lou, and K. Ren, "Group device pairing based secure sensor association and key management for body area networks," in IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
IEEE INFOCOM
, pp. 1-9
-
-
Li, M.1
Yu, S.2
Lou, W.3
Ren, K.4
-
20
-
-
80055071454
-
Kalwen: A new practical and interoperable key management scheme for body sensor networks
-
Y. Law, G. Moniava, Z. Gong, P. Hartel, and M. Palaniswami, "Kalwen: A new practical and interoperable key management scheme for body sensor networks," Security and Communication Networks, vol. 4, no. 11, pp. 1309-1329, 2011.
-
(2011)
Security and Communication Networks
, vol.4
, Issue.11
, pp. 1309-1329
-
-
Law, Y.1
Moniava, G.2
Gong, Z.3
Hartel, P.4
Palaniswami, M.5
-
21
-
-
84860663236
-
Secure ad-hoc trust initialization and key management in wireless body area networks
-
To Appear
-
M. Li, S. Yu, J. Guttman, W. Lou, and K. Ren, "Secure ad-hoc trust initialization and key management in wireless body area networks," ACM Transactions on Sensor Networks (TOSN), (To Appear), 2012.
-
(2012)
ACM Transactions on Sensor Networks (TOSN)
-
-
Li, M.1
Yu, S.2
Guttman, J.3
Lou, W.4
Ren, K.5
-
22
-
-
79960873920
-
IMDGuard: Securing implantable medical devices with the external wearable guardian
-
F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li, "IMDGuard: Securing implantable medical devices with the external wearable guardian," in IEEE INFOCOM, 2011, pp. 1862-1870.
-
(2011)
IEEE INFOCOM
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.3
Wang, B.4
Li, Q.5
-
23
-
-
84879545585
-
Body area network: A fuzzy attribute-based signcryption scheme
-
C. Hu, N. Zhang, H. Li, X. Cheng, and X. Liao, "Body area network: A fuzzy attribute-based signcryption scheme," IEEE Journal on Selected Areas in Communications (Special Issue on Emerging Technologies in Communications), 2012.
-
(2012)
IEEE Journal on Selected Areas in Communications (Special Issue on Emerging Technologies in Communications
-
-
Hu, C.1
Zhang, N.2
Li, H.3
Cheng, X.4
Liao, X.5
-
24
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
S. Cherukuri, K. Venkatasubramanian, and S. Gupta, "Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in International Conference on Parallel Processing Workshops, 2003, pp. 432-439.
-
(2003)
International Conference on Parallel Processing Workshops
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.2
Gupta, S.3
-
25
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
C. Poon, Y. Zhang, and S. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.1
Zhang, Y.2
Bao, S.3
-
26
-
-
30844458593
-
A fuzzy vault scheme
-
A. Juels and M. Sudan, "A fuzzy vault scheme," Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, 2006.
-
(2006)
Designs, Codes and Cryptography
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
27
-
-
33744717971
-
Fuzzy vault for fingerprints
-
U. Uludag, S. Pankanti, and A. Jain, "Fuzzy vault for fingerprints," in Audio-and Video-Based Biometric Person Authentication, 2005, pp. 55-71.
-
(2005)
Audio-and Video-Based Biometric Person Authentication
, pp. 55-71
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.3
-
29
-
-
33646164892
-
Pacemaker and icd generator malfunctions
-
W. Maisel, M. Moynahan, B. Zuckerman, T. Gross, O. Tovar, D. Tillman, and D. Schultz, "Pacemaker and icd generator malfunctions," JAMA: the journal of the American Medical Association, vol. 295, no. 16, p. 1901, 2006.
-
(2006)
JAMA: The Journal of the American Medical Association
, vol.295
, Issue.16
, pp. 1901
-
-
Maisel, W.1
Moynahan, M.2
Zuckerman, B.3
Gross, T.4
Tovar, O.5
Tillman, D.6
Schultz, D.7
-
30
-
-
84860682242
-
Zero reconciliation secret key generation for body-worn health monitoring devices
-
S. Ali, V. Sivaraman, and D. Ostry, "Zero reconciliation secret key generation for body-worn health monitoring devices," in ACM Wisec, 2012, pp. 39-50.
-
(2012)
ACM Wisec
, pp. 39-50
-
-
Ali, S.1
Sivaraman, V.2
Ostry, D.3
-
31
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
32
-
-
85062838317
-
Safeguarding cryptographic keys
-
AFIPS Press
-
G. BLAKLEY, "Safeguarding cryptographic keys," in AFIPS Conference Proceedings, vol. 48. AFIPS Press, 1979, pp. 313-317.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.1
-
33
-
-
84862010429
-
Verifiable multi-secret sharing based on LFSR sequences
-
August
-
C. Hu, X. Liao, and X. Cheng, "Verifiable multi-secret sharing based on LFSR sequences," Theoretical Computer Science, vol. 445, pp. 52-62, August 2012.
-
(2012)
Theoretical Computer Science
, vol.445
, pp. 52-62
-
-
Hu, C.1
Liao, X.2
Cheng, X.3
-
34
-
-
84860670556
-
-
IEEE 802.15 WPAN Task Group 6., September
-
D. Davenport, N. Seidl, J. Moss, M. Patel, A. Batra, J. M. Ho, S. Hosur, J. C. Roh, T. Schmidl, O. Omeni, and A. Wong, "Medwin Mac and Security Proposal - Documentation," IEEE 802.15 WPAN Task Group 6., September 2009.
-
(2009)
Medwin Mac and Security Proposal - Documentation
-
-
Davenport, D.1
Seidl, N.2
Moss, J.3
Patel, M.4
Batra, A.5
Ho, J.M.6
Hosur, S.7
Roh, J.C.8
Schmidl, T.9
Omeni, O.10
Wong, A.11
-
35
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
K. Ren, W. Lou, K. Zeng, and P. Moran, "On broadcast authentication in wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 6, no. 11, pp. 4136-4144, 2007.
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.4
-
36
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in IEEE PerCom, 2005, pp. 324-328.
-
(2005)
IEEE PerCom
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
37
-
-
0028960610
-
Detection of ecg characteristic points using wavelet transforms
-
C. Li, C. Zheng, and C. Tai, "Detection of ecg characteristic points using wavelet transforms," IEEE Transactions on Biomedical Engineering, vol. 42, no. 1, pp. 21-28, 1995.
-
(1995)
IEEE Transactions on Biomedical Engineering
, vol.42
, Issue.1
, pp. 21-28
-
-
Li, C.1
Zheng, C.2
Tai, C.3
-
38
-
-
12144285744
-
A wavelet-based ecg delineator: Evaluation on standard databases
-
J. Mart́?nez, R. Almeida, S. Olmos, A. Rocha, and P. Laguna, "A wavelet-based ecg delineator: evaluation on standard databases," IEEE Transactions on Biomedical Engineering, vol. 51, no. 4, pp. 570-581, 2004.
-
(2004)
IEEE Transactions on Biomedical Engineering
, vol.51
, Issue.4
, pp. 570-581
-
-
Mart́nez, J.1
Almeida, R.2
Olmos, S.3
Rocha, A.4
Laguna, P.5
|