-
2
-
-
84863560791
-
Ladon: Endto-end authorisation support for resource-deprived environments
-
J. Astorga, E. Jacob, M. Huarte and M. Higuero, Ladon: Endto-end authorisation support for resource-deprived environments, IET Information Security Journal 6(2) (2012), 93-101.
-
(2012)
IET Information Security Journal
, vol.6
, Issue.2
, pp. 93-101
-
-
Astorga, J.1
Jacob, E.2
Huarte, M.3
Higuero, M.4
-
3
-
-
84898467569
-
AVISPA: Automated Validation of Internet Security Protocols and Applications
-
AVISPA: Automated Validation of Internet Security Protocols and Applications, FET Open Project IST-2001-39252, http://www.avispa-project.org.
-
FET Open Project IST-2001-39252
-
-
-
4
-
-
0031351741
-
A concrete security treatment of symmetric encryption: Analysis of the des modes of operation
-
M. Bellare, A. Desai, E. Jokipii and P. Rogaway, A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation, in: Proc. 38th Annual Symposium on Foundations of Computer Science (FOCS 97), 1997.
-
(1997)
Proc. 38th Annual Symposium on Foundations of Computer Science (FOCS
, vol.97
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
5
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
M. Bellare, J. Kilian and P. Rogaway, The security of the cipher block chaining message authentication code, Journal of Computer and System Sciences 61(3) (2000), 362-399.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
6
-
-
84898411646
-
-
v1.0 rev00 Bluetooth Special interest Group (SIG
-
Bluetooth Health Device Profile (BT HDP) v1.0 rev00 Bluetooth Special interest Group (SIG), http://www.bluetooth.com (2011).
-
(2011)
Bluetooth Health Device Profile (BT HDP
-
-
-
7
-
-
52949100212
-
An ultra low power, high performance medical implant communication system (MICS) transceiver for implantable devices
-
P.D. Bradley, An ultra low power, high performance medical implant communication system (MICS) transceiver for implantable devices, in: Proc. IEEE Biomedical Circuits and Systems Conference, 2006, pp. 158-161.
-
(2006)
Proc IEEE Biomedical Circuits and Systems Conference
, pp. 158-161
-
-
Bradley, P.D.1
-
8
-
-
84898410849
-
The internet of things now includes a human heart
-
J. Carusso, The internet of things now includes a human heart, Network World (2009).
-
(2009)
Network World
-
-
Carusso, J.1
-
9
-
-
33750736026
-
Technology insight: Telementoring and telesurgery in urology
-
B. Challacombe, L. Kavoussi, A. Patriciu, D. Stoianovici and P. Dasgupta, Technology insight: Telementoring and telesurgery in urology, Nature Clinical Practice Urology 3(11) (2006), 611-617.
-
(2006)
Nature Clinical Practice Urology
, vol.3
, Issue.11
, pp. 611-617
-
-
Challacombe, B.1
Kavoussi, L.2
Patriciu, A.3
Stoianovici, D.4
Dasgupta, P.5
-
11
-
-
34247859642
-
Telemonitoring or structured telephone support programmes for patients with chronic heart failure: Systematic review and meta-analysis
-
R.A. Clark, S.C. Inglis, F.A. McAlister, J.G. F. Cleland and S. Stewart, Telemonitoring or structured telephone support programmes for patients with chronic heart failure: Systematic review and meta-analysis, BMJ: British Medical Journal 334 (2007), 942-950.
-
(2007)
BMJ: British Medical Journal
, vol.334
, pp. 942-950
-
-
Clark, R.A.1
Inglis, S.C.2
McAlister, F.A.3
Cleland, J.G.F.4
Stewart, S.5
-
12
-
-
77949376557
-
Current use of pacemakers, implantable cardioverter defibrillators, and resynchronization devices: Data from the registry of the European Heart Rhythm Association
-
H. Ector and P. Vardas, Current use of pacemakers, implantable cardioverter defibrillators, and resynchronization devices: Data from the registry of the European Heart Rhythm Association, European Heart Journal Supplements 9 (2007), 144-149.
-
(2007)
European Heart Journal Supplements
, vol.9
, pp. 144-149
-
-
Ector, H.1
Vardas, P.2
-
13
-
-
44649168555
-
A prospective multicenter comparison trial of home monitoring against regular follow-up in MADIT II patients: Additional visits and cost impact
-
C. Elsner et al., A prospective multicenter comparison trial of home monitoring against regular follow-up in MADIT II patients: Additional visits and cost impact, Computers in Cardiology 33 (2006), 241-244.
-
(2006)
Computers in Cardiology
, vol.33
, pp. 241-244
-
-
Elsner, C.1
-
14
-
-
43749117056
-
ACC/AHA/HRS 2008 guidelines for device-based therapy of cardiac rhythm abnormalities
-
A.E. Epstein et al., ACC/AHA/HRS 2008 guidelines for device-based therapy of cardiac rhythm abnormalities, J. Am. Coll. Cardiol. 51(21) (2008), e1-62.
-
(2008)
J. Am. Coll. Cardiol
, vol.51
, Issue.21
-
-
Epstein, A.E.1
-
15
-
-
12844264192
-
Potential cost savings by telemedicineassisted long-term care of implantable cardioverter defibrillator recipients
-
L. Fauchier et al., Potential cost savings by telemedicineassisted long-term care of implantable cardioverter defibrillator recipients, Pacing and Clinical Electrophysiology 28, 255-259.
-
Pacing and Clinical Electrophysiology
, vol.28
, pp. 255-259
-
-
Fauchier, L.1
-
16
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D.F. Ferriarolo, R. Sandhu, S. Gavrila, D. Kuhn and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and Systems Security 4(3) (2001), 224-274.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferriarolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
17
-
-
34748898963
-
The energy cost of cryptographic key establishment in wireless sensor networks
-
J. Grobschädl, A. Szekely and S. Tillich, The energy cost of cryptographic key establishment in wireless sensor networks, Proc. 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS '07), 2007, pp. 380-382.
-
(2007)
Proc. 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS '07
, pp. 380-382
-
-
Grobschädl, J.1
Szekely, A.2
Tillich, S.3
-
20
-
-
84898414510
-
-
ISO/IEEE11073 -Personal Health Devices standard (X73PHD), Health Informatics. [P11073-00103. Technical report-Overview] [P11073-104zz. Device specializations] [P11073-20601. Application profile -Optimized exchange protocol]
-
ISO/IEEE11073 -Personal Health Devices standard (X73PHD), Health Informatics. [P11073-00103. Technical report-Overview] [P11073-104zz. Device specializations] [P11073-20601. Application profile -Optimized exchange protocol], http://standards.ieee.org (2011).
-
(2011)
-
-
-
21
-
-
84883897746
-
A Low-energy key management protocol for wireless sensor networks
-
G. Jolly, M.C. Kusçu, P. Kokate and M. Younis, A Low-energy key management protocol for wireless sensor networks, in: Proc. Eighth IEEE International Symposium on Computers and Communications (ISCC '03), 2003, pp. 335-340.
-
(2003)
Proc. Eighth IEEE International Symposium on Computers and Communications (ISCC '03)
, pp. 335-340
-
-
Jolly, G.1
Kusçu, M.C.2
Kokate, P.3
Younis, M.4
-
22
-
-
0028466968
-
SESAME: The solution to security for open distributed systems
-
P. Kaijser, T. Parker and D. Pinkas, SESAME: The solution to security for open distributed systems, Computer Communications 17(7) (1994), 501-518.
-
(1994)
Computer Communications
, vol.17
, Issue.7
, pp. 501-518
-
-
Kaijser, P.1
Parker, T.2
Pinkas, D.3
-
24
-
-
53249137431
-
Key lengths
-
H. Bidgoli, ed., John Wiley & Sons
-
A.K. Lenstra, Key lengths, in: Handbook of Information Security, H. Bidgoli, ed., John Wiley & Sons, 2005, pp. 617-635.
-
(2005)
Handbook of Information Security
, pp. 617-635
-
-
Lenstra, A.K.1
-
25
-
-
84898480260
-
-
available at
-
Libtom Project, available at: http://libtom.org/.
-
Libtom Project
-
-
-
27
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
M. Luk, G. Mezzour, A. Perrig and V. Gligor, MiniSec: A secure sensor network communication architecture, in: Proc. 6th Int. Conf. Information Processing in Sensor Networks (IPSN'07), 2007, pp. 479-488.
-
(2007)
Proc. 6th Int. Conf. Information Processing in Sensor Networks (IPSN'07
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
28
-
-
68949178835
-
Securing wireless implantable devices for healthcare: Ideas and challenges
-
K. Malasri and L. Wang, Securing wireless implantable devices for healthcare: Ideas and challenges, IEEE Communications Magazine 47(7) (2009), 74-80.
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.7
, pp. 74-80
-
-
Malasri, K.1
Wang, L.2
-
29
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
G. de Meulenaer, F. Gosset, F.-X. Standaert and O. Pereira, On the energy cost of communication and cryptography in wireless sensor networks, in: Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communication (WIMOB'08), 2008, pp. 580-585.
-
(2008)
Proc IEEE International Conference on Wireless and Mobile Computing, Networking and Communication (WIMOB'08
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
30
-
-
0027316628
-
Proxy-based authorization and accounting for distributed systems
-
C. Neuman, Proxy-based authorization and accounting for distributed systems, in: Proc. 13th Int. Conf. Distributed Computing Systems, 1993, pp. 283-291.
-
(1993)
Proc. 13th Int. Conf. Distributed Computing Systems
, pp. 283-291
-
-
Neuman, C.1
-
31
-
-
0003899818
-
The Kerberos network authentication service (v5
-
C. Neuman, S. Hartman and K. Raeburn, The Kerberos network authentication service (v5), RFC 4120 (2005).
-
(2005)
RFC
, vol.4120
-
-
Neuman, C.1
Hartman, S.2
Raeburn, K.3
-
32
-
-
85016596484
-
LiSP: A lightweight security protocol for wireless sensor networks
-
T. Park and K.G. Shin, LiSP: A lightweight security protocol for wireless sensor networks, ACM Transactions on Embedded Computing Systems 3(3) (2004), 634-660.
-
(2004)
ACM Transactions on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 634-660
-
-
Park, T.1
Shin, K.G.2
-
33
-
-
0036738266
-
Culler, SPINS: Security protocolos for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen and D. E. Culler, SPINS: Security protocolos for sensor networks, ACMWireless Networks 8(5) (2002), 521-534.
-
(2002)
ACMWireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
-
34
-
-
84898420894
-
Personal Health Devices Working Group (PHDWG
-
Personal Health Devices Working Group (PHDWG), IEEE Standards, http://standards.ieee.org/PHDworkgroup/(2011).
-
IEEE Standards
, vol.2011
-
-
-
36
-
-
41449098948
-
LEDS: Providing locationaware end-to-end data security in wireless sensor networks
-
K. Ren, W. Lou and Y. Zhang, LEDS: Providing locationaware end-to-end data security in wireless sensor networks, IEEE Transactions on Mobile Computing 7(5) (2008), 585-598.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
38
-
-
33750300697
-
LSec: Lightweight security protocol for distributed wireless sensor network
-
R.A. Shaikh, S. Lee, M.A.U. Khan and Y.J. Song, LSec: Lightweight security protocol for distributed wireless sensor network, in: Proc. 11th IFIP Int. Conf. Personal Wireless Communications (PWC'06), 2006, pp. 367-377.
-
(2006)
Proc. 11th IFIP Int. Conf. Personal Wireless Communications (PWC'06
, pp. 367-377
-
-
Shaikh, R.A.1
Lee, S.2
Khan, M.A.U.3
Song, Y.J.4
-
39
-
-
18844368499
-
Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis
-
R. Venugopalan, P. Ganesan, P. Peddabachagari, A. Dean, F. Mueller and M. Sichitiu, Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis, in: 2003 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, 2003, pp. 188-197.
-
2003 International Conference on Compilers, Architectures and Synthesis for Embedded Systems
, vol.2003
, pp. 188-197
-
-
Venugopalan, R.1
Ganesan, P.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
40
-
-
84898440258
-
Kerberos explained
-
M. Walla, Kerberos explained, Windows 2000 Advantage magazine (2000), http://technet.microsoft.com/enus/library/bb742516.aspx.
-
(2000)
Windows 2000 Advantage Magazine
-
-
Walla, M.1
-
42
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
R.Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn and P. Kruus, TinyPK: Securing sensor networks with public key technology, in: Proc. 2nd ACM Workshop Security of Ad Hoc & Sensor Networks, 2004, pp. 59-64.
-
(2004)
Proc. 2nd ACM Workshop Security of Ad Hoc & Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
|