-
1
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
DOI 10.1109/MPRV.2004.18
-
K. Lorincz, D. J. Malan, T. R. F. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, S. Moulton, and M. Welsh, "Sensor networks for emergency response: Challenges and opportunities," IEEE Pervasive Comput., vol. 3, no. 4, pp. 16-23, Oct./Dec. 2004. (Pubitemid 40010894)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.J.2
Fulford-Jones, T.R.F.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Welsh, M.8
Moulton, S.9
-
2
-
-
54549116071
-
Secure, efficient data transmission over body sensor and wireless networks
-
N. Challa, H. Çam, and M. Sikri, "Secure, efficient data transmission over body sensor and wireless networks," EURASIP J. Wireless Commun. Netw., vol. 2008, Article ID 291365, 2008.
-
(2008)
EURASIP J. Wireless Commun. Netw.
, vol.2008
, pp. 291365
-
-
Challa, N.1
Çam, H.2
Sikri, M.3
-
3
-
-
84885148646
-
-
[Online]. Available
-
The health Information Trust Alliance (HITRUST). [Online]. Available:http://www.hitrustalliance.org
-
-
-
-
4
-
-
84885156799
-
-
The US Congress. Washington, DC. [Online]. Available
-
The US Congress. (1996). Health Insurance Portability and Accountability Act. Washington, DC. [Online]. Available:http://www.hhs.gov/ocr/privacy/
-
(1996)
Health Insurance Portability and Accountability Act
-
-
-
6
-
-
70349646298
-
Design and implementation of a secure wireless mote-based medical sensor network
-
K. Malasri and L. Wang, "Design and implementation of a secure wireless mote-based medical sensor network," Sensors, vol. 9, no. 8, pp. 6273-6297, 2009.
-
(2009)
Sensors
, vol.9
, Issue.8
, pp. 6273-6297
-
-
Malasri, K.1
Wang, L.2
-
7
-
-
84907899140
-
Body area networking standardization: Present and future directions
-
C. Cordeiro and M. Patel, "Body area networking standardization: Present and future directions," in Proc. Body Nets, 2007.
-
Proc. Body Nets, 2007
-
-
Cordeiro, C.1
Patel, M.2
-
8
-
-
85008955601
-
Efficient implementation of public key cryptosystems on mote sensors
-
H. Wang and Q. Li, "Efficient implementation of public key cryptosystems on mote sensors," in Proc. Int. Conf. Inf. Commun. Security, 2006, pp. 519-528.
-
Proc. Int. Conf. Inf. Commun. Security, 2006
, pp. 519-528
-
-
Wang, H.1
Li, Q.2
-
9
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
W. Du, J. Deng, Y. Han, P. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," ACM Trans. Inf. Syst. Security, vol. 8, no. 2, pp. 228-258, May 2005. (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
10
-
-
84861445209
-
SDRP: A secure and distributed reprogramming protocol for wireless sensor networks
-
Nov.
-
D. He, C. Chen, S. Chan, and J. Bu, "SDRP: A secure and distributed reprogramming protocol for wireless sensor networks," IEEE Trans. Ind. Electron., vol. 59, no. 11, pp. 4155-4163, Nov. 2012.
-
(2012)
IEEE Trans. Ind. Electron.
, vol.59
, Issue.11
, pp. 4155-4163
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
11
-
-
60449084386
-
SMOCK: A scalable method of cryptographic key management for mission-critical wireless ad-hoc networks
-
Mar.
-
W. He, Y. Huang, R. Sathyam, K. Nahrstedt, and W. Lee, "SMOCK: A scalable method of cryptographic key management for mission-critical wireless ad-hoc networks," IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 140-150, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.1
, pp. 140-150
-
-
He, W.1
Huang, Y.2
Sathyam, R.3
Nahrstedt, K.4
Lee, W.5
-
12
-
-
84860887293
-
A survey of applications of identity-based cryptography in mobile ad-hoc networks
-
May
-
S. Zhao, A. Aggarwal, R. Frost, and X. Bai, "A survey of applications of identity-based cryptography in mobile ad-hoc networks," IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 380-400, May 2012.
-
(2012)
IEEE Commun. Surveys Tuts.
, vol.14
, Issue.2
, pp. 380-400
-
-
Zhao, S.1
Aggarwal, A.2
Frost, R.3
Bai, X.4
-
13
-
-
35549002780
-
Addressing security in medical sensor networks
-
K. Malasri and L. Wang, "Addressing security in medical sensor networks," in Proc. Health Net., 2007, pp. 7-12.
-
Proc. Health Net., 2007
, pp. 7-12
-
-
Malasri, K.1
Wang, L.2
-
14
-
-
56649112965
-
Using the timing information of heartbeats as an entity identifier to secure body sensor network
-
Nov.
-
S. Bao, C. Poon, Y. Zhang, and L. Shen, "Using the timing information of heartbeats as an entity identifier to secure body sensor network," IEEE Trans. Inf. Technol. Biomed., vol. 12, no. 6, pp. 772-779, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Technol. Biomed.
, vol.12
, Issue.6
, pp. 772-779
-
-
Bao, S.1
Poon, C.2
Zhang, Y.3
Shen, L.4
-
15
-
-
84879695352
-
A cluster-based key agreement scheme using keyed hashing for body area networks
-
DOI: 10.1007/s11042-011-0791-4
-
A. Ali, S. Irum, F. Kausar, and F. Khan, "A cluster-based key agreement scheme using keyed hashing for body area networks," Multimed. Tools Appl., 2011, DOI: 10.1007/s11042-011-0791-4.
-
(2011)
Multimed. Tools Appl.
-
-
Ali, A.1
Irum, S.2
Kausar, F.3
Khan, F.4
-
16
-
-
70449562519
-
IBE-Lite: A lightweight identity-based cryptography for body sensor networks
-
Nov.
-
C. C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-Lite: A lightweight identity-based cryptography for body sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 926-932, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Technol. Biomed.
, vol.13
, Issue.6
, pp. 926-932
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
17
-
-
84870885560
-
A distributed trust evaluation model and its application scenarios for medical sensor networks
-
Nov.
-
D. He, C. Chen, S. Chan, J. Bu, and A. Vasilakos, "A distributed trust evaluation model and its application scenarios for medical sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 6, pp. 1164-1175, Nov. 2012.
-
(2012)
IEEE Trans. Inf. Technol. Biomed.
, vol.16
, Issue.6
, pp. 1164-1175
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
Vasilakos, A.5
-
18
-
-
84863512174
-
ReTrust: Attack resistant and lightweight trust management for medical sensor networks
-
Jul.
-
D. He, C. Chen, S. Chan, J. Bu, and A. Vasilakos, "ReTrust: Attack resistant and lightweight trust management for medical sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 4, pp. 623-632, Jul. 2012.
-
(2012)
IEEE Trans. Inf. Technol. Biomed.
, vol.16
, Issue.4
, pp. 623-632
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
Vasilakos, A.5
-
19
-
-
84655162295
-
Prototype of a secure wireless patient monitoring system for the medical community
-
Jan.
-
S. Mollera, T. Newe, and S. Lochmann, "Prototype of a secure wireless patient monitoring system for the medical community," Sens. Actuators A: Phys., vol. 173, no. 1, pp. 55-65, Jan. 2012.
-
(2012)
Sens. Actuators A: Phys.
, vol.173
, Issue.1
, pp. 55-65
-
-
Mollera, S.1
Newe, T.2
Lochmann, S.3
-
20
-
-
0020128340
-
THEORY OF SPREAD-SPECTRUM COMMUNICATIONS - A TUTORIAL
-
R. Pickholtz, D. Schilling, and L. Milstein, "Theory of spread spectrum communications-a tutorial," IEEE Trans. Commun., vol. 30, no. 5, pp. 855-884, May 1982. (Pubitemid 12523784)
-
(1982)
IEEE Transactions on Communications
, vol.30
, Issue.5 PART 1
, pp. 855-884
-
-
Pickholtz, R.L.1
Schilling, D.L.2
Milstein, L.B.3
-
21
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Proc. Adv. Cryptol., 1993
-
C. Blundo, A. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in Proc. Adv. Cryptol., 1993, vol. LNCS-740, pp. 471-486.
-
LNCS
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
22
-
-
33748324558
-
Energy-aware lossless data compression
-
DOI 10.1145/1151690.1151692
-
K. C. Barr and K. Asanovi, "Energy aware lossless data compression," ACM Trans. Comput. Syst., vol. 24, no. 3, pp. 250-291, Aug. 2006. (Pubitemid 44330468)
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, Issue.3
, pp. 250-291
-
-
Barr, K.C.1
Asanovic, K.2
-
23
-
-
84885128263
-
-
Available
-
Tiny OS. [Online]. Available:http://www.tinyos.net
-
Tiny OS. [Online]
-
-
-
24
-
-
78049298573
-
The price of security in wireless sensor networks
-
Dec.
-
J. Lee, K. Kapitanova, and S. Son, "The price of security in wireless sensor networks," Comput. Netw., vol. 54, no. 17, pp. 2967-2978, Dec. 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.17
, pp. 2967-2978
-
-
Lee, J.1
Kapitanova, K.2
Son, S.3
-
25
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
K. Piotrowski, P. Langendoerfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," in Proc. SASN, 2006, pp. 69-176.
-
Proc. SASN, 2006
, pp. 69-176
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
26
-
-
51249087814
-
Tiny ECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu and P. Ning, "Tiny ECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in Proc. Int. Conf. Inf. Process. Sensor Netw., 2008, pp. 245-256.
-
Proc. Int. Conf. Inf. Process. Sensor Netw., 2008
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
27
-
-
26444574670
-
Tiny Sec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner, "Tiny Sec: A link layer security architecture for wireless sensor networks," in Proc. ACM SenSys, 2004, pp. 162-175.
-
Proc. ACM SenSys, 2004
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
28
-
-
84885119875
-
-
[Online]. Available
-
[Online]. Available: http://tinyos.cvs.sourceforge.net/viewvc/tinyos/ tinyos- 2.x-contrib/crypto/index.html
-
-
-
|