-
1
-
-
0036356471
-
Body area network (BAN) - A key infrastructure element for patient-centered medical applications
-
R. Schmidt, T. Norgall, J. Mörsdorf, J. Bernhard, and T. von der Grün, "Body area network (BAN)-a key infrastructure element for patient-centered medical applications," Biomedizinische Technik/Biomedical Engineering, vol. 47, no. s1a, 2002.
-
(2002)
Biomedizinische Technik/Biomedical Engineering
, vol.47
, Issue.S1A
-
-
Schmidt, R.1
Norgall, T.2
Mörsdorf, J.3
Bernhard, J.4
Von Der Grün, T.5
-
2
-
-
0034772382
-
Research challenges in wireless networks of biomedical sensors
-
L. Schwiebert, S. Gupta, and J. Weinmann, "Research challenges in wireless networks of biomedical sensors," in MobiCom, 2001.
-
(2001)
MobiCom
-
-
Schwiebert, L.1
Gupta, S.2
Weinmann, J.3
-
3
-
-
77951003031
-
Potential and challenges of body area networks for personal health
-
J. Penders, J. vande Molengraft, L. Brown, B. Grundlehner, B. Gyselinckx, and C. V. Hoof, "Potential and challenges of body area networks for personal health," in EMBC, 2009.
-
(2009)
EMBC
-
-
Penders, J.1
Vande Molengraft, J.2
Brown, L.3
Grundlehner, B.4
Gyselinckx, B.5
Hoof, C.V.6
-
4
-
-
84860253312
-
Security and privacy issues in wireless sensor networks for healthcare applications
-
M. Al Ameen, J. Liu, and K. Kwak, "Security and privacy issues in wireless sensor networks for healthcare applications," J. Medical Syst., vol. 36, 2012.
-
(2012)
J. Medical Syst.
, vol.36
-
-
Al Ameen, M.1
Liu, J.2
Kwak, K.3
-
5
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," TWC, vol. 17, no. 1, pp. 51-58, 2010.
-
(2010)
TWC
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
6
-
-
84868130466
-
A review on body area networks security for healthcare
-
G. H. Zhang, C. C. Y. Poon, and Y. T. Zhang, "A review on body area networks security for healthcare," ISRN Commun. Netw., vol. 2011, no. 21, 2011.
-
(2011)
ISRN Commun. Netw.
, vol.2011
, Issue.21
-
-
Zhang, G.H.1
Poon, C.C.Y.2
Zhang, Y.T.3
-
7
-
-
77649151691
-
Monitoring patients via a secure and mobile healthcare system
-
Y. Ren, R. Pazzi, and A. Boukerche, "Monitoring patients via a secure and mobile healthcare system," TWC, vol. 17, no. 1, 2010.
-
(2010)
TWC
, vol.17
, Issue.1
-
-
Ren, Y.1
Pazzi, R.2
Boukerche, A.3
-
8
-
-
84930228444
-
Routing for information leakage reduction in multi-channel multi-hop ad-hoc social networks
-
W. Cheng, D. Wu, X. Cheng, and D. Chen, "Routing for information leakage reduction in multi-channel multi-hop ad-hoc social networks," in WASA, 2012.
-
(2012)
WASA
-
-
Cheng, W.1
Wu, D.2
Cheng, X.3
Chen, D.4
-
9
-
-
84930228445
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in S&P, 2008.
-
(2008)
S&P
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Ransford, B.3
Clark, S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.9
-
11
-
-
76849098534
-
PSKA: Usable and secure key agreement scheme for body area networks
-
K. Venkatasubramanian, A. Banerjee, and S. Gupta, "PSKA: Usable and secure key agreement scheme for body area networks," TITB, vol. 14, no. 1, 2010.
-
(2010)
TITB
, vol.14
, Issue.1
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.3
-
12
-
-
33645998872
-
Fuzzy identity-based encryption
-
A. Sahai. and B. Waters, "Fuzzy identity-based encryption," in EURO-CRYPT, 2005.
-
(2005)
EURO-CRYPT
-
-
Sahai, A.1
Waters, B.2
-
13
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in CCS, 2006.
-
(2006)
CCS
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
14
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in S&P, 2007, pp. 321-334.
-
(2007)
S&P
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
15
-
-
34548364110
-
Insider attacker detection in wireless sensor networks
-
F. Liu, X. Cheng, and D. Chen, "Insider attacker detection in wireless sensor networks," in INFOCOM, 2007.
-
(2007)
INFOCOM
-
-
Liu, F.1
Cheng, X.2
Chen, D.3
-
16
-
-
77953307472
-
From time domain to space domain: Detecting replica attacks in mobile ad hoc networks
-
K. Xing and X. Cheng, "From time domain to space domain: Detecting replica attacks in mobile ad hoc networks," in INFOCOM, 2010.
-
(2010)
INFOCOM
-
-
Xing, K.1
Cheng, X.2
-
17
-
-
51849154670
-
Realtime detection of clone attacks in wireless sensor networks
-
K. Xing, F. Liu, X. Cheng, and D. H.-C. Du, "Realtime detection of clone attacks in wireless sensor networks," in ICDCS, 2008.
-
(2008)
ICDCS
-
-
Xing, K.1
Liu, F.2
Cheng, X.3
Du, D.H.-C.4
-
18
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Comm. ACM 22(11), 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
-
-
Shamir, A.1
-
19
-
-
84862010429
-
Verifiable multi-secret sharing based on lrsr sequences
-
C. Hu, X. Liao, and X. Cheng, "Verifiable multi-secret sharing based on lrsr sequences," Theoretical Comput. Science, vol. 445, 2012.
-
(2012)
Theoretical Comput. Science
, vol.445
-
-
Hu, C.1
Liao, X.2
Cheng, X.3
-
20
-
-
37649017555
-
An efficient threshold verifiable multi-secret sharing
-
M. Dehkordi and S. Mashhadi, "An efficient threshold verifiable multi-secret sharing," Comput. Standards Interfaces, vol. 30, no. 3, 2008.
-
(2008)
Comput. Standards Interfaces
, vol.30
, Issue.3
-
-
Dehkordi, M.1
Mashhadi, S.2
-
21
-
-
84861848116
-
Secret image sharing based on chaotic map and chinese remainder theorem
-
C. Hu, X. Liao, and D. Xiao, "Secret image sharing based on chaotic map and chinese remainder theorem," International J. Wavelets, Multiresolution Inf. Process., vol. 10, no. 03, 2012.
-
(2012)
International J. Wavelets, Multiresolution Inf. Process
, vol.10
, Issue.3
-
-
Hu, C.1
Liao, X.2
Xiao, D.3
-
22
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., vol. 32, no. 3, 2003.
-
(2003)
SIAM J. Comput
, vol.32
, Issue.3
-
-
Boneh, D.1
Franklin, M.2
-
23
-
-
24944590176
-
Efficient identity-based encryption without random oracles
-
B. Waters, "Efficient identity-based encryption without random oracles," in EUROCRYPT, 2005.
-
(2005)
EUROCRYPT
-
-
Waters, B.1
-
24
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
K. Ren, W. Lou, K. Zeng, and P. Moran, "On broadcast authentication in wireless sensor networks," TWC, vol. 6, no. 11, 2007.
-
(2007)
TWC
, vol.6
, Issue.11
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.4
-
25
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in PerCom, 2005.
-
(2005)
PerCom
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
26
-
-
33750742005
-
-
Online
-
G. Bertoni, L. Chen, P. Fragneto, K. Harrison, and G. Pelosi, "Computing tate pairing on smartcards," [Online]. Available: http://www.st.com/stonline/products/families/smartcard/ches2005v4.pdf, 2005.
-
(2005)
Computing Tate Pairing on Smartcards
-
-
Bertoni, G.1
Chen, L.2
Fragneto, P.3
Harrison, K.4
Pelosi, G.5
-
27
-
-
33646164892
-
Pacemaker and icd generator malfunctions
-
W. Maisel, M. Moynahan, B. Zuckerman, T. Gross, O. Tovar, D. Tillman, and D. Schultz, "Pacemaker and icd generator malfunctions," JAMA, vol. 295, no. 16, 2006.
-
(2006)
JAMA
, vol.295
, Issue.16
-
-
Maisel, W.1
Moynahan, M.2
Zuckerman, B.3
Gross, T.4
Tovar, O.5
Tillman, D.6
Schultz, D.7
-
28
-
-
38349178199
-
Security and privacy for implantable medical devices
-
D. Halperin, T. Kohno, T. Heydt-Benjamin, K. Fu, and W. Maisel, "Security and privacy for implantable medical devices," Pervasive Comput., IEEE, vol. 7, no. 1, 2008.
-
(2008)
Pervasive Comput., IEEE
, vol.7
, Issue.1
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.3
Fu, K.4
Maisel, W.5
-
29
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
C. Poon, Y. Zhang, and S. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Commun. Mag., vol. 44, no. 4, 2006.
-
(2006)
IEEE Commun. Mag
, vol.44
, Issue.4
-
-
Poon, C.1
Zhang, Y.2
Bao, S.3
-
30
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
S. Cherukuri, K. Venkatasubramanian, and S. Gupta, "Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in ICPP, 2003.
-
(2003)
ICPP
-
-
Cherukuri, S.1
Venkatasubramanian, K.2
Gupta, S.3
-
32
-
-
84879861042
-
OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks
-
C. Hu, X. Cheng, F. Zhang, D. Wu, X. Liao, and D. Chen, "OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks," in INFOCOM, 2013.
-
(2013)
INFOCOM
-
-
Hu, C.1
Cheng, X.2
Zhang, F.3
Wu, D.4
Liao, X.5
Chen, D.6
-
33
-
-
77956424716
-
A fuzzy commitment scheme
-
A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in CCS, 1999.
-
(1999)
CCS
-
-
Juels, A.1
Wattenberg, M.2
-
34
-
-
79952122961
-
A human body model for efficient numerical characterization of uwb signal propagation in wireless body area networks
-
H. B. Lim, D. Baumann, and E.-P. Li, "A human body model for efficient numerical characterization of uwb signal propagation in wireless body area networks." IEEE Trans. Biomedical Eng., vol. 58, no. 3, 2011.
-
(2011)
IEEE Trans. Biomedical Eng
, vol.58
, Issue.3
-
-
Lim, H.B.1
Baumann, D.2
Li, E.-P.3
-
35
-
-
34548205306
-
iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks
-
L. Ma, X. Cheng, F. Liu, F. An, and M. Rivera, "iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks," IEEE Trans. Parallel Distributed Syst., vol. 18, no. 8, 2007.
-
(2007)
IEEE Trans. Parallel Distributed Syst
, vol.18
, Issue.8
-
-
Ma, L.1
Cheng, X.2
Liu, F.3
An, F.4
Rivera, M.5
-
36
-
-
38349093891
-
LKE: A self-configuring scheme for location-aware key establishment in wireless sensor networks
-
F. Liu and X. Cheng, "LKE: A self-configuring scheme for location-aware key establishment in wireless sensor networks," TWC, vol. 7, no. 1, 2008.
-
(2008)
TWC
, vol.7
, Issue.1
-
-
Liu, F.1
Cheng, X.2
-
37
-
-
44149083595
-
SBK: A self-configuring framework for bootstrapping keys in sensor networks
-
F. Liu, X. Cheng, L. Ma, and K. Xing, "SBK: A self-configuring framework for bootstrapping keys in sensor networks," TMC, vol. 7, no. 7, 2008.
-
(2008)
TMC
, vol.7
, Issue.7
-
-
Liu, F.1
Cheng, X.2
Ma, L.3
Xing, K.4
-
38
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in CCS, 2002.
-
(2002)
CCS
-
-
Eschenauer, L.1
Gligor, V.2
-
39
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in CCS, 2003.
-
(2003)
CCS
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
40
-
-
84874325466
-
Body sensor network security: An identity-based cryptography approach
-
C. Tan, H. Wang, S. Zhong, and Q. Li, "Body sensor network security: An identity-based cryptography approach," in WiSec, 2008.
-
(2008)
WiSec
-
-
Tan, C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
41
-
-
70349682512
-
FDAC: Toward fine-grained distributed data access control in wireless sensor networks
-
S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks," in INFOCOM, 2009.
-
(2009)
INFOCOM
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
42
-
-
58049089548
-
Secure monitoring scheme based on identity-based threshold signcryption for wireless sensor networks
-
J. Li, D. Wei, and H. Kou, "Secure monitoring scheme based on identity-based threshold signcryption for wireless sensor networks," in WiCOM, 2008.
-
(2008)
WiCOM
-
-
Li, J.1
Wei, D.2
Kou, H.3
-
43
-
-
77955088735
-
Efficient online/offline identity-based signature for wireless sensor network
-
J. Liu, J. Baek, J. Zhou, Y. Yang, and J. Wong, "Efficient online/offline identity-based signature for wireless sensor network," International J. Inf. Security, vol. 9, 2010.
-
(2010)
International J. Inf. Security
, vol.9
-
-
Liu, J.1
Baek, J.2
Zhou, J.3
Yang, Y.4
Wong, J.5
-
44
-
-
79956145687
-
An efficient identity-based broadcast signcryption scheme for wireless sensor networks
-
I. Kim and S. Hwang, "An efficient identity-based broadcast signcryption scheme for wireless sensor networks," in ISWPC, 2011.
-
(2011)
ISWPC
-
-
Kim, I.1
Hwang, S.2
|