-
1
-
-
0037086890
-
"Wireless body sensor networks: A survey" [J]
-
AKYILDIZ I. F, SU W, SANKARASUBRAMANIAM Y, "Wireless body sensor networks: A survey" [J]. computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
-
2
-
-
33646948221
-
A novel biometrics to securewireless body area sensor networks for telemedicine and M-health
-
April
-
C C. Y. POON and Y-T ZHANG, "A NOVEL BIOMETRICS TO SECUREWIRELESS BODY AREA SENSOR NETWORKS FOR TELEMEDICINE AND M-HEALTH", IEEE Communications Magazine, vol: 44, no: 4, April 2006, pp. 73-81.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.C.Y.1
Zhang, Y.-T.2
-
3
-
-
4544301464
-
"Random key assignment for secure Wireless body sensor networks", [C]
-
PIETRO R D, MANCIN I L V, and ANDMEI A "Random key assignment for secure Wireless body sensor networks", [C]. in ACM Workshop on Security in Ad Hoc and Body wireless body sensor networks (SASN'03), pp. 62-71, 2003.
-
(2003)
ACM Workshop on Security in Ad Hoc and Body Wireless Body Sensor Networks (SASN'03)
, pp. 62-71
-
-
Pietro, R.D.1
Mancin, I.L.V.2
Andmei, A.3
-
4
-
-
77958058620
-
Distributed private-key generators for identity-based cryptography[A]
-
ANIKET K, IAN G. DISTRIBUTED PRIVATE-KEY GENERATORS FOR IDENTITY-BASED CRYPTOGRAPHY[A]. Security and Cryptography for Networks[C]. 2010. 436-453.. 4
-
(2010)
Security and Cryptography for Networks[C]
, vol.436
, Issue.453
, pp. 4
-
-
Aniket, K.1
Ian, G.2
-
5
-
-
35048818581
-
"Comparing elliptic curve cryptography and RSA on 8-bit CPUs", [C]
-
Shantz, Boston, August 11-13
-
GURA N, PATEL A, WANDER A, EBERLE H et al. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs", [C]. in Proceedings of the Workshop on Cryptography Hardware and Embedded Systems (CHES 2004), Boston, August 11-13 2004.
-
(2004)
Proceedings of the Workshop on Cryptography Hardware and Embedded Systems (CHES 2004)
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
-
6
-
-
20344381294
-
"A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, "[C]
-
Santa Clara, California, October
-
MALAN D J, WELSH M, and SMITH M D, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, "[C]. in The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, pp. 71-79, October 2004.
-
(2004)
The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks
, pp. 71-79
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
7
-
-
85020598353
-
"Identity-based cryptography and signature schemes", [J]
-
SHAMIR A, "Identity-based cryptography and signature schemes", [J]. Advances in Cryptology, CRYPTO'84, Lecture Notes in Computer Science, vol. 196, pp. 47-53, 1985.
-
(1985)
Advances in Cryptology, CRYPTO'84, Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
8
-
-
84874324906
-
"Identity-based encryption from the Weil pairing", [J]
-
BONEH D and FRANKLIN M, "Identity-based encryption from the Weil pairing", [J]. In Advances in Cryptology, CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 213-229, 2001.
-
(2001)
Advances in Cryptology, CRYPTO 2001, Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
35248874429
-
"Multipurpose identity-based signcryption, a swiss army knife for identity-based cryptography", [C]
-
rd Interna. Conf. On Advances in Cryptology, Lecture Notes in Computer Science, vol. 2729, pp. 383-399, 2003.
-
(2003)
rd Interna. Conf. on Advances in Cryptology, Lecture Notes in Computer Science
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
10
-
-
79951516809
-
Wildcarded identity-based encryption[J]
-
ABDALLA M, BIRKETT J, CATALANO D, et al. Wildcarded identity-based encryption[J]. Journal of Cryptology, 2011, 24(1):42-82..
-
(2011)
Journal of Cryptology
, vol.24
, Issue.1
, pp. 42-82
-
-
Abdalla, M.1
Birkett, J.2
Catalano, D.3
-
11
-
-
33750206791
-
An authenticated identity-based key establishment and encryption scheme for Wireless sensor networks [J]
-
CHENG H B, YANG G, WANG J T, HUANG X. An authenticated identity-based key establishment and encryption scheme for Wireless sensor networks [J]. The Journal of China University of Posts and telecommunications, 2006, 13(2):31-38.
-
(2006)
The Journal of China University of Posts and Telecommunications
, vol.13
, Issue.2
, pp. 31-38
-
-
Cheng, H.B.1
Yang, G.2
Wang, J.T.3
Huang, X.4
-
12
-
-
0038148549
-
Efficient algorithms for maximum lifetime data gathering and aggregation in Wireless sensor networks
-
KALPAKIS K, DASGUPTA K, NAMJOSHI P. Efficient algorithms for maximum lifetime data gathering and aggregation in Wireless sensor networks. ACM Computer Networks, 2003, 42(6):697-716.
-
(2003)
ACM Computer Networks
, vol.42
, Issue.6
, pp. 697-716
-
-
Kalpakis, K.1
Dasgupta, K.2
Namjoshi, P.3
-
13
-
-
0037295692
-
Directed diffusion for Wireless body sensor networking
-
INTANAGONWIWAT C, GOVINDAN R, ESTRIN D, HEIDEMANN J, SILVA F. Directed diffusion for Wireless body sensor networking. IEEE/ACM Trans. on Networking, 2003, 11(1):2-16.
-
(2003)
IEEE/ACM Trans. on Networking
, vol.11
, Issue.1
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
14
-
-
0037295692
-
DIRECTED DIFFUSION FOR WIRELESS SENSOR NETWORKING
-
C. INTANAGONWIWAT, R. GOVINDAN, D. ESTRIN, J. HEIDEMANN, and F. SILVA, "DIRECTED DIFFUSION FOR WIRELESS SENSOR NETWORKING", IEEE Trans. Networking, vol. 11, no. 1, pp. 2-16 2003
-
(2003)
IEEE Trans. Networking
, vol.11
, Issue.1
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
15
-
-
84908568204
-
-
Technical Report, Department of Computer Science, University of Colorado, Boulder
-
HARTUNG C., BALASALLE J., and HAN R., "Node Compromise in Body wireless body sensor networks: The Need for Secure Systems", Technical Report CU-CS-988-04, Department of Computer Science, University of Colorado, Boulder, 2004.
-
(2004)
Node Compromise in Body Wireless Body Sensor Networks: The Need for Secure Systems
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
16
-
-
3042738543
-
Swatt: Software-based Attestation for sensor node device
-
Oakland, CA, May
-
SESHADRI, A., et al., "Swatt: Software-based Attestation for sensor node device" Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 2004.
-
(2004)
Proc. IEEE Symposium on Security and Privacy
-
-
Seshadri, A.1
|