-
1
-
-
79956094375
-
Body area networks: A survey
-
Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., Leung, V. C.: Body area networks: a survey. Mob. Netw. Appl. 16(2), 171-193 (2011).
-
(2011)
Mob. Netw. Appl
, vol.16
, Issue.2
, pp. 171-193
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.C.5
-
2
-
-
84906788546
-
Wireless body area networks: A survey
-
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., Jamalipour, A.: Wireless body area networks: a survey. Commun. Surv. Tutorials, IEEE 16(3), 1658-1686 (2014).
-
(2014)
Commun. Surv. Tutorials, IEEE
, vol.16
, Issue.3
, pp. 1658-1686
-
-
Movassaghi, S.1
Abolhasan, M.2
Lipman, J.3
Smith, D.4
Jamalipour, A.5
-
3
-
-
84950277156
-
-
15. 6-2012 Standard for Wireless Body Area Networks
-
Association, T. I. S.: IEEE P802. 15. 6-2012 Standard for Wireless Body Area Networks (2012). http://standards. ieee. org/findstds/standard/802. 15. 6-2012. html.
-
(2012)
IEEE P802
-
-
-
4
-
-
33745179557
-
HMQV: A high-performance secure diffie-hellman protocol
-
Shoup, V. (ed.),. Springer, Heidelberg
-
Krawczyk, H.: HMQV: a high-performance secure diffie-hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005).
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
5
-
-
70349692414
-
Another look at HMQV
-
Menezes, A.: Another look at HMQV. Math. Cryptology JMC 1(1), 47-64 (2007).
-
(2007)
Math. Cryptology JMC
, vol.1
, Issue.1
, pp. 47-64
-
-
Menezes, A.1
-
7
-
-
84921467128
-
Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy
-
Toorani, M.: Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy. Secur. Commun. Netw. 8(4), 694-701 (2015).
-
(2015)
Secur. Commun. Netw
, vol.8
, Issue.4
, pp. 694-701
-
-
Toorani, M.1
-
8
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Preneel, B. (ed.),. Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000).
-
(2000)
EUROCRYPT 2000. LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
10
-
-
11244267013
-
-
Springer, Berlin
-
Hankerson, D., Vanstone, S., Menezes, A. J.: Guide to Elliptic Curve Cryptography. Springer, Berlin (2004).
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Vanstone, S.2
Menezes, A.J.3
-
11
-
-
84950256432
-
Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks
-
Misra, S., Goswami, S., Taneja, C., Mukherjee, A.: Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks. International Journal of Communication Systems (2014).
-
(2014)
International Journal of Communication Systems
-
-
Misra, S.1
Goswami, S.2
Taneja, C.3
Mukherjee, A.4
-
12
-
-
38149012093
-
Stronger security of authenticated key exchange
-
Susilo, W., Liu, J.K., Mu, Y. (eds.),. Springer, Heidelberg
-
LaMacchia, B. A., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J. K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007).
-
(2007)
ProvSec 2007. LNCS
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.A.1
Lauter, K.2
Mityagin, A.3
-
13
-
-
79959951878
-
Cryptanalysis of an elliptic curve-based signcryption scheme
-
Toorani, M., Beheshti, A.: Cryptanalysis of an elliptic curve-based signcryption scheme. Int. J. Netw. Secur. 10(1), 51-56 (2010).
-
(2010)
Int. J. Netw. Secur
, vol.10
, Issue.1
, pp. 51-56
-
-
Toorani, M.1
Beheshti, A.2
|