메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 432-439

Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body

Author keywords

Biometrics; Biosensors; Communication system security; Condition monitoring; Humans; Materials science and technology; Microelectronics; Telemedicine; Wireless networks; Wireless sensor networks

Indexed keywords

BIOMETRICS; BIOSENSORS; CONDITION MONITORING; HEALTH; MICROELECTRONICS; MILITARY APPLICATIONS; MONITORING; TELEMEDICINE; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84939435969     PISSN: 15302016     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPPW.2003.1240399     Document Type: Conference Paper
Times cited : (274)

References (18)
  • 1
    • 84943306334 scopus 로고    scopus 로고
    • Health Insurance Portability Accountability Act (HIPAA)
    • Health Insurance Portability Accountability Act (HIPAA)
  • 5
    • 78650805835 scopus 로고    scopus 로고
    • A Communications Security Architecture and Cryptographic Mechanisms for Distributed Sensor Networks
    • NAI Labs, The Security Research Division Network Associates, Inc.
    • D. Carman, B. Matt, D. Balenson and P. Kruus "A Communications Security Architecture and Cryptographic Mechanisms for Distributed Sensor Networks" In In DARPA SensIT Workshop. NAI Labs, The Security Research Division Network Associates, Inc., 1999.
    • (1999) DARPA SensIT Workshop
    • Carman, D.1    Matt, B.2    Balenson, D.3    Kruus, P.4
  • 9
    • 84948990100 scopus 로고
    • The RC5 Encryption Algorithm
    • Fast Software Encryption - Second International Workshop, Leuven, Belgium, SpringerVerlag
    • R. L. Rivest. The RC5 Encryption Algorithm. In Fast Software Encryption - Second International Workshop, Leuven, Belgium, LNCS 1008, pages 86-96, SpringerVerlag, 1995.
    • (1995) LNCS , vol.1008 , pp. 86-96
    • Rivest, R.L.1
  • 11
    • 1542313506 scopus 로고
    • ACM Special Interest Group in Communication (SIGCOMM), 1995
    • J. Touch Performance Analysis of MD5 (1995). In ACM Special Interest Group in Communication (SIGCOMM), 1995.
    • (1995) Performance Analysis of MD5
    • Touch, J.1
  • 17
    • 84947902207 scopus 로고    scopus 로고
    • Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor
    • Eli Biham, editor, Fast Software Encryption '97, Springer-Verlag
    • B. Schneier and D. Whiting Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor In Eli Biham, editor, Fast Software Encryption '97, volume 1267 of Lecture Notes in Computer Science, pages 242-259. Springer-Verlag, 1997
    • (1997) Lecture Notes in Computer Science , vol.1267 , pp. 242-259
    • Schneier D. Whiting, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.