-
1
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
DOI 10.1109/MPRV.2004.18
-
K. Lorincz, D. Malan, T. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton, "Sensor networks for emergency response: challenges and opportunities," IEEE Pervasive Computing, vol. 3, no. 4, pp. 16-23, oct.-dec. 2004. (Pubitemid 40010894)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.J.2
Fulford-Jones, T.R.F.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Welsh, M.8
Moulton, S.9
-
2
-
-
79956094375
-
Body area networks: A survey
-
Apr.
-
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. C. Leung, "Body area networks: A survey," Mob. Netw. Appl., vol. 16, no. 2, pp. 171-193, Apr. 2011.
-
(2011)
Mob. Netw. Appl.
, vol.16
, Issue.2
, pp. 171-193
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.C.5
-
3
-
-
77649107719
-
Applications, challenges, and prospective in emerging body area networking technologies
-
February
-
M. Patel and J. Wang, "Applications, challenges, and prospective in emerging body area networking technologies," IEEE Wireless Commun., vol. 17, no. 1, pp. 80-88, february 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.1
, pp. 80-88
-
-
Patel, M.1
Wang, J.2
-
4
-
-
18244373181
-
A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation
-
march
-
E. Jovanov, A. Milenkovic, C. Otto, and P. C. de Groen, "A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation," J Neuroengineering Rehabil, vol. 2, no. 1, p. 6, march 2005.
-
(2005)
J Neuroengineering Rehabil
, vol.2
, Issue.1
, pp. 6
-
-
Jovanov, E.1
Milenkovic, A.2
Otto, C.3
De Groen, P.C.4
-
5
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
DOI 10.1109/MPRV.2004.18
-
K. Lorincz, D. Malan, T. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton, "Sensor networks for emergency response: challenges and opportunities," IEEE Pervasive Computing, vol. 3, no. 4, pp. 16-23, oct.-dec. 2004. (Pubitemid 40010894)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.J.2
Fulford-Jones, T.R.F.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Welsh, M.8
Moulton, S.9
-
7
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
February
-
M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Commun., vol. 17, no. 1, pp. 51- 58, february 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
8
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
oct.
-
S. Cherukuri, K. Venkatasubramanian, and S. Gupta, "Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on, oct. 2003, pp. 432-439.
-
(2003)
Parallel Processing Workshops 2003. Proceedings. 2003 International Conference on
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.2
Gupta, S.3
-
9
-
-
84860672350
-
-
august
-
K. Timm, "Medical device hacking prompts concern," august 2011. [Online]. Available: http://www.cyberprivacynews.com/2011/08/medicaldevice- hacking-prompts-concern/
-
(2011)
Medical Device Hacking Prompts Concern
-
-
Timm, K.1
-
10
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
may
-
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in Security and Privacy, 2008. SP 2008. IEEE Symposium on, may 2008, pp. 129-142.
-
(2008)
Security and Privacy 2008. SP 2008. IEEE Symposium on
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Ransford, B.3
Clark, S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.9
-
11
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
New York, NY, USA: ACM
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. 9th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2002, pp. 41-47.
-
(2002)
Proc. 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
12
-
-
28444433009
-
Random key predistribution schemes for sensor networks Security and Privacy 2003
-
may
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Security and Privacy, 2003. Proceedings. 2003 Symposium on, may 2003, pp. 197-213.
-
(2003)
Proceedings. 2003 Symposium on
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
13
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228-258, May 2005. (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
14
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proc. 10th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2003, pp. 52-61. (Pubitemid 40673788)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
15
-
-
42149172778
-
Group-based key predistribution for wireless sensor networks
-
30, Apr
-
D. Liu, P. Ning, and W. Du, "Group-based key predistribution for wireless sensor networks," ACM Trans. Sen. Netw., vol. 4, no. 2, pp. 11:1-11:30, Apr. 2008.
-
(2008)
ACM Trans. Sen. Netw.
, vol.4
, Issue.2
, pp. 111-111
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
16
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Sep
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: security protocols for sensor networks," Wirel. Netw., vol. 8, no. 5, pp. 521-534, Sep. 2002.
-
(2002)
Wirel. Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
17
-
-
77958096949
-
Non-cryptographic authentication and identification in wireless networks [security and Privacy in Emerging Wireless Networks]
-
October
-
K. Zeng, K. Govindan, and P. Mohapatra, "Non-cryptographic authentication and identification in wireless networks [security and privacy in emerging wireless networks]," IEEE Wireless Commun., vol. 17, pp. 56-62, october 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, pp. 56-62
-
-
Zeng, K.1
Govindan, K.2
Mohapatra, P.3
-
18
-
-
84860670073
-
Bana: Body area network authentication exploiting channel characteristics
-
NewYork, NY, USA: ACM
-
L. Shi, M. Li, S. Yu, and J. Yuan, "Bana: body area network authentication exploiting channel characteristics," in Proc. fifth ACM conference on Security and Privacy in Wireless and Mobile Networks. NewYork, NY, USA: ACM, 2012, pp. 27-38.
-
(2012)
Proc. Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
, pp. 27-38
-
-
Shi, L.1
Li, M.2
Yu, S.3
Yuan, J.4
-
19
-
-
35549002780
-
Addressing security in medical sensor networks
-
DOI 10.1145/1248054.1248058, HealthNet'07: Proceedings of the 1st ACM SIGMOBILE International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments
-
K. Malasri and L. Wang, "Addressing security in medical sensor networks," in Proc. 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments. New York, NY, USA: ACM, 2007, pp. 7-12. (Pubitemid 350003842)
-
(2007)
HealthNet'07: Proceedings of the 1st ACM SIGMOBILE International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments
, pp. 7-12
-
-
Malasri, K.1
Wang, L.2
-
20
-
-
84860663238
-
A new approach for evolution of end to end in wireless sensor network
-
june
-
S. A. Devi, R. V. Babu, and B. S. Rao, "A new approach for evolution of end to end in wireless sensor network," International J. Computer Science and Engineering, vol. 3, no. 6, pp. 2531-2543, june 2011.
-
(2011)
International J. Computer Science and Engineering
, vol.3
, Issue.6
, pp. 2531-2543
-
-
Devi, S.A.1
Babu, R.V.2
Rao, B.S.3
-
21
-
-
84878431584
-
A light weight protocol to provide location privacy in wireless bodyarea networks
-
march
-
M. Mana, M. Feham, and B. A. Bensaber, "A light weight protocol to provide location privacy in wireless bodyarea networks," International J. Network Security & Its Applications, vol. 3, no. 2, pp. 1-11, march 2011.
-
(2011)
International J. Network Security & Its Applications
, vol.3
, Issue.2
, pp. 1-11
-
-
Mana, M.1
Feham, M.2
Bensaber, B.A.3
-
22
-
-
79952574261
-
A lightweight authentication scheme for wireless sensor networks
-
2011
-
O. Delgado-Mohatar, A. Fuster-Sabater, and J. M. Sierra, "A lightweight authentication scheme for wireless sensor networks," Ad Hoc Networks, vol. 9, no. 5, pp. 727-735, 2011.
-
Ad Hoc Networks
, vol.9
, Issue.5
, pp. 727-735
-
-
Delgado-Mohatar, O.1
Fuster-Sabater, A.2
Sierra, J.M.3
-
23
-
-
84860685134
-
A lightweight security framework for wireless sensor networks
-
September
-
T. Zia and A. Zomaya, "A lightweight security framework for wireless sensor networks," J. Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, pp. 53-73, september 2011.
-
(2011)
J. Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, vol.2
, pp. 53-73
-
-
Zia, T.1
Zomaya, A.2
-
24
-
-
56749165131
-
Body sensor network security: An identity-based cryptography approach
-
New York, NY, USA: ACM
-
C. C. Tan, H. Wang, S. Zhong, and Q. Li, "Body sensor network security: an identity-based cryptography approach," in Proc. first ACM conference on Wireless network security. New York, NY, USA: ACM, 2008, pp. 148-153.
-
(2008)
Proc. First ACM Conference on Wireless Network Security
, pp. 148-153
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
25
-
-
70449562519
-
Ibe-lite: A lightweight identitybased cryptography for body sensor networks
-
Nov
-
C. Tan, H. Wang, S. Zhong, and Q. Li, "Ibe-lite: A lightweight identitybased cryptography for body sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 926-932, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Technol. Biomed.
, vol.13
, Issue.6
, pp. 926-932
-
-
Tan, C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
26
-
-
84868125268
-
A hybrid authentication and key establishment scheme for wban
-
June
-
W. Drira, E. Renault, and D. Zeghlache, "A hybrid authentication and key establishment scheme for wban," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, June 2012, pp. 78-83.
-
(2012)
Trust, Security and Privacy in Computing and Communications (TrustCom) 2012 IEEE 11th International Conference on
, pp. 78-83
-
-
Drira, W.1
Renault, E.2
Zeghlache, D.3
-
27
-
-
77953304550
-
Group device pairing based secure sensor association and key management for body area networks
-
march
-
M. Li, S. Yu, W. Lou, and K. Ren, "Group device pairing based secure sensor association and key management for body area networks," in INFOCOM, 2010 Proceedings IEEE, march 2010, pp. 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Li, M.1
Yu, S.2
Lou, W.3
Ren, K.4
-
28
-
-
84860663236
-
Secure ad-hoc trust initialization and key management in wireless body area networks
-
M. Li, S. Yu, J. D. Guttman, W. Lou, and K. Ren, Secure ad-hoc trust initialization and key management in wireless body area networks, ACM Trans. Sensor Networks (TOSN), 2012.
-
(2012)
ACM Trans. Sensor Networks (TOSN)
-
-
Li, M.1
Yu, S.2
Guttman, J.D.3
Lou, W.4
Ren, K.5
-
29
-
-
84861648316
-
Exploiting prediction to enable secure and reliable routing in wireless body area networks
-
March
-
X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang, "Exploiting prediction to enable secure and reliable routing in wireless body area networks," in INFOCOM, 2012 Proc. IEEE, March 2012, pp. 388-396.
-
(2012)
INFOCOM, 2012 Proc. IEEE
, pp. 388-396
-
-
Liang, X.1
Li, X.2
Shen, Q.3
Lu, R.4
Lin, X.5
Shen, X.6
Zhuang, W.7
-
30
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health
-
DOI 10.1109/MCOM.2006.1632652
-
C. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and mhealth," IEEE Commun. Mag., vol. 44, no. 4, pp. 73-81, april 2006. (Pubitemid 43792671)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.C.Y.1
Zhang, Y.-T.2
Bao, S.-D.3
-
31
-
-
77954990804
-
Physiological valuebased efficient usable security solutions for body sensor networks
-
Jul
-
K. K. Venkatasubramanian and S. K. S. Gupta, "Physiological valuebased efficient usable security solutions for body sensor networks," ACM Trans. Sen. Netw., vol. 6, no. 4, pp. 31:1-31:36, Jul. 2010.
-
(2010)
ACM Trans. Sen. Netw.
, vol.6
, Issue.4
, pp. 311-3136
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
32
-
-
76849098534
-
Pska: Usable and secure key agreement scheme for body area networks
-
jan
-
K. Venkatasubramanian, A. Banerjee, and S. Gupta, "Pska: Usable and secure key agreement scheme for body area networks," IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 1, pp. 60-68, jan. 2010.
-
(2010)
IEEE Trans. Inf. Technol. Biomed.
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.3
-
33
-
-
51349156683
-
Authenticated key establishment protocols for a home health care system
-
dec.
-
K. Singh and V. Muthukkumarasamy, "Authenticated key establishment protocols for a home health care system," in Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference on, dec. 2007, pp. 353-358.
-
(2007)
Intelligent Sensors, Sensor Networks and Information 2007. ISSNIP 2007. 3rd International Conference on
, pp. 353-358
-
-
Singh, K.1
Muthukkumarasamy, V.2
-
34
-
-
77954990804
-
Physiological valuebased efficient usable security solutions for body sensor networks
-
July
-
K. K. Venkatasubramanian and S. K. S. Gupta, "Physiological valuebased efficient usable security solutions for body sensor networks," ACM Trans. Sen. Netw., vol. 6, pp. 31:1-31:36, July 2010.
-
(2010)
ACM Trans. Sen. Netw.
, vol.6
, pp. 311-33136
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
35
-
-
79960873920
-
Imdguard: Securing implantable medical devices with the external wearable guardian
-
Shanghai, P.R.China, April
-
F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li, "Imdguard: Securing implantable medical devices with the external wearable guardian," in The 30th IEEE International Conference on Computer Communications (INFOCOM 2011), Shanghai, P.R.China, April 2011, pp. 1862-1870.
-
(2011)
The 30th IEEE International Conference on Computer Communications (INFOCOM 2011)
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.3
Wang, B.4
Li, Q.5
-
36
-
-
79960856885
-
Biometric-based two-level secure access control for implantable medical devices during emergencies
-
Shanghai, P.R.China, April
-
X. Hei and X. Du, "Biometric-based two-level secure access control for implantable medical devices during emergencies," in The 30th IEEE International Conference on Computer Communications (INFOCOM 2011), Shanghai, P.R.China, April 2011, pp. 346-350.
-
(2011)
The 30th IEEE International Conference on Computer Communications (INFOCOM 2011)
, pp. 346-350
-
-
Hei, X.1
Du, X.2
-
37
-
-
38049075710
-
Shake well before use: Authentication based on accelerometer data
-
A. LaMarca, M. Langheinrich, and K. Truong, Eds. Springer Berlin /Heidelberg
-
R. Mayrhofer and H. Gellersen, "Shake well before use: Authentication based on accelerometer data," in Pervasive Computing, ser. Lecture Notes in Computer Science, A. LaMarca, M. Langheinrich, and K. Truong, Eds. Springer Berlin /Heidelberg, 2007, vol. 4480, pp. 144-161.
-
(2007)
Pervasive Computing, Ser. Lecture Notes in Computer Science
, vol.4480
, pp. 144-161
-
-
Mayrhofer, R.1
Gellersen, H.2
-
38
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
], "Shake well before use: Intuitive and secure pairing of mobile devices," IEEE Trans. Mobile Computing, vol. 8, pp. 792-806, 2009.
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, pp. 792-806
-
-
-
39
-
-
38349004892
-
Amigo: Proximity-based authentication of mobile devices
-
Berlin, Heidelberg: Springer-Verlag
-
A. Varshavsky, A. Scannell, A. LaMarca, and E. De Lara, "Amigo: proximity-based authentication of mobile devices," in Proc. 9th international conference on Ubiquitous computing. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 253-270.
-
(2007)
Proc. 9th International Conference on Ubiquitous Computing
, pp. 253-270
-
-
Varshavsky, A.1
Scannell, A.2
Lamarca, A.3
De Lara, E.4
-
40
-
-
77955002645
-
Ensemble: Cooperative proximity-based authentication
-
New York, NY, USA: ACM
-
A. Kalamandeen, A. Scannell, E. de Lara, A. Sheth, and A. LaMarca, "Ensemble: cooperative proximity-based authentication," in Proc. 8th international conference on Mobile systems, applications, and services. New York, NY, USA: ACM, 2010, pp. 331-344.
-
(2010)
Proc. 8th International Conference on Mobile Systems, Applications, and Services
, pp. 331-344
-
-
Kalamandeen, A.1
Scannell, A.2
De Lara, E.3
Sheth, A.4
Lamarca, A.5
-
41
-
-
84883400493
-
-
Network and Distributed System Security Symposium
-
L. Cai, K. Zeng, H. Chen, and P. Mohapatra, Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas, in Network and Distributed System Security Symposium, 2011.
-
(2011)
Good Neighbor: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas
-
-
Cai, L.1
Zeng, K.2
Chen, H.3
Mohapatra, P.4
-
42
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
New York, NY, USA: ACM
-
N. Patwari and S. K. Kasera, "Robust location distinction using temporal link signatures," in Proc. 13th annual ACM international conference on Mobile computing and networking. New York, NY, USA: ACM, 2007, pp. 111-122.
-
(2007)
Proc. 13th Annual ACM International Conference on Mobile Computing and Networking
, pp. 111-122
-
-
Patwari, N.1
Kasera, S.K.2
-
43
-
-
79961063540
-
Proximate: Proximity-based secure pairing using ambient wireless signals
-
New York, NY, USA: ACM
-
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam, "Proximate: proximity-based secure pairing using ambient wireless signals," in Proc. 9th international conference on Mobile systems, applications, and services. New York, NY, USA: ACM, 2011, pp. 211-224.
-
(2011)
Proc. 9th International Conference on Mobile Systems, Applications, and Services
, pp. 211-224
-
-
Mathur, S.1
Miller, R.2
Varshavsky, A.3
Trappe, W.4
Mandayam, N.5
-
44
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
New York, NY, USA: ACM
-
K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun, "Proximity-based access control for implantable medical devices," in Proc. 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 410-419.
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security
, pp. 410-419
-
-
Rasmussen, K.B.1
Castelluccia, C.2
Heydt-Benjamin, T.S.3
Capkun, S.4
-
45
-
-
84976295016
-
Distance-bounding protocols
-
Secaucus, NJ, USA: Springer-Verlag New York, Inc.
-
S. Brands and D. Chaum, "Distance-bounding protocols," in Workshop on the theory and application of cryptographic techniques on Advances in cryptology. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 1994, pp. 344-359.
-
(1994)
Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
46
-
-
85076297394
-
Realization of rf distance bounding
-
Berkeley,CA,USA: USENIX Association
-
K. B. Rasmussen and S. Capkun, "Realization of rf distance bounding," in Proc. 19th USENIX conference on Security. Berkeley,CA,USA: USENIX Association, 2010, pp. 25-25.
-
(2010)
Proc. 19th USENIX Conference on Security
, pp. 25-25
-
-
Rasmussen, K.B.1
Capkun, S.2
-
47
-
-
70449479456
-
Characterization of the dynamic narrowband on-body to off-body area channel
-
june
-
D. Smith, L. Hanlen, J. Zhang, D. Miniutti, D. Rodda, and B. Gilbert, "Characterization of the dynamic narrowband on-body to off-body area channel," in Communications, 2009. ICC '09. IEEE International Conference on, june 2009, pp. 1-6.
-
(2009)
Communications 2009. ICC '09. IEEE International Conference on
, pp. 1-6
-
-
Smith, D.1
Hanlen, L.2
Zhang, J.3
Miniutti, D.4
Rodda, D.5
Gilbert, B.6
-
48
-
-
79951803442
-
Secret key generation rate vs reconciliation cost using wireless channel characteristics in body area networks
-
S. Ali, V. Sivaraman, and D. Ostry, "Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks," in Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on. IEEE, 2010, pp. 644- 650.
-
(2010)
Embedded and Ubiquitous Computing (EUC) 2010 /IFIP 8th International Conference On. IEEE
, pp. 644-650
-
-
Ali, S.1
Sivaraman, V.2
Ostry, D.3
-
50
-
-
2542441781
-
Channel model for wireless communication around human body
-
april
-
J. Ryckaert, P. De Doncker, R. Meys, A. de Le Hoye, and S. Donnay, "Channel model for wireless communication around human body," Electronics Letters, vol. 40, no. 9, pp. 543-544, april 2004.
-
(2004)
Electronics Letters
, vol.40
, Issue.9
, pp. 543-544
-
-
Ryckaert, J.1
De Doncker, P.2
Meys, R.3
De Hoye Le, A.4
Donnay, S.5
-
51
-
-
84856865292
-
On-body to on-body channel characterization
-
Oct.
-
F. Di Franco, C. Tachtatzis, B. Graham, D. Tracey, N. Timmons, and J. Morrison, "On-body to on-body channel characterization," in Sensors, 2011 IEEE, oct. 2011, pp. 908-911.
-
(2011)
Sensors 2011 IEEE
, pp. 908-911
-
-
Di Franco, F.1
Tachtatzis, C.2
Graham, B.3
Tracey, D.4
Timmons, N.5
Morrison, J.6
-
52
-
-
79952950550
-
The effect of body shape and gender on wireless body area network on-body channels
-
Oct.
-
F. Di Franco, C. Tachtatzis, B. Graham, M. Bykowski, D. Tracey, N. Timmons, and J. Morrison, "The effect of body shape and gender on wireless body area network on-body channels," in Antennas and Propagation (MECAP), 2010 IEEE Middle East Conference on, oct. 2010, pp. 1-3.
-
(2010)
Antennas and Propagation (MECAP) 2010 IEEE Middle East Conference on
, pp. 1-3
-
-
Di Franco, F.1
Tachtatzis, C.2
Graham, B.3
Bykowski, M.4
Tracey, D.5
Timmons, N.6
Morrison, J.7
-
53
-
-
0026910649
-
Effects of radio propagation path loss on DS-CDMA cellular frequency reuse efficiency for the reverse channel
-
DOI 10.1109/25.155970Rappaport Theodore S.Milstein Laurence B.
-
T. Rappaport and L. Milstein, "Effects of radio propagation path loss on ds-cdma cellular frequency reuse efficiency for the reverse channel," IEEE Trans. Veh. Technol., vol. 41, no. 3, pp. 231-242, aug 1992. (Pubitemid 23562472)
-
(1992)
IEEE Transactions on Vehicular Technology
, vol.41
, Issue.3
, pp. 231-242
-
-
-
54
-
-
84869480392
-
Authenticated secret key extraction utilizing channel characteristics for body area networks
-
p. to appear
-
L. Shi, J. Yuan, S. Yu, and M. Li, "Authenticated secret key extraction utilizing channel characteristics for body area networks," in Proc. 6th ACM conference on Security and Privacy in Wireless and Mobile Networks, 2013, p. to appear.
-
(2013)
Proc. 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks
-
-
Shi, L.1
Yuan, J.2
Yu, S.3
Li, M.4
-
55
-
-
0027928863
-
Applications of weighted voronoi diagrams and randomization to variance-based k-clustering: (Extended abstract)
-
New York, NY, USA: ACM
-
M. Inaba, N. Katoh, and H. Imai, "Applications of weighted voronoi diagrams and randomization to variance-based k-clustering: (extended abstract)," in Proc. tenth annual symposium on Computational geometry. New York, NY, USA: ACM, 1994, pp. 332-339.
-
(1994)
Proc. Tenth Annual Symposium on Computational Geometry
, pp. 332-339
-
-
Inaba, M.1
Katoh, N.2
Imai, H.3
|