-
1
-
-
84939430498
-
Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art
-
PID: 2628032
-
Ali, A., and Khan, F.A., Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art. J. Med. Syst. 39:115, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, pp. 115
-
-
Ali, A.1
Khan, F.A.2
-
2
-
-
23144460039
-
Security of public-key cryptosystems based on Chebyshev polynomials
-
Bergamo, P., Arco, P., Santis, A., Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems I 52(7):1382–1393, 2005.
-
(2005)
IEEE Transactions on Circuits and Systems I
, vol.52
, Issue.7
, pp. 1382-1393
-
-
Bergamo, P.1
Arco, P.2
Santis, A.3
Kocarev, L.4
-
3
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Canetti, R., and Krawczyk, H., Analysis of key-exchange protocols and their use for building secure channels. Lect. Notes Comput. Sci. 2045:453–474, 2001.
-
(2001)
Lect. Notes Comput. Sci.
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
4
-
-
84904272742
-
A secure medical data exchange protocol based on cloud environments
-
PID: 2503771
-
Chen, C.L., Yang, T.T., Shih, T.F., A secure medical data exchange protocol based on cloud environments. J. Med. Syst. 38:112, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, pp. 112
-
-
Chen, C.L.1
Yang, T.T.2
Shih, T.F.3
-
5
-
-
70449431904
-
SPINE2: developing BSN applications on heterogeneous sensor nodes
-
Special Session on Wireless Health, Lausann
-
Fortino, G., Guerrieri, A., Giannantonio, R., Bellifemine, F.: SPINE2: developing BSN applications on heterogeneous sensor nodes. In: Proceedings of IEEE Symposium on Industrial Embedded Systems (SIES 2009), pp. 8–10. Special Session on Wireless Health, Lausanne (2009)
-
(2009)
Proceedings of IEEE Symposium on Industrial Embedded Systems (SIES 2009)
, pp. 8-10
-
-
Fortino, G.1
Guerrieri, A.2
Giannantonio, R.3
Bellifemine, F.4
-
6
-
-
84874226703
-
BodyCloud: integration of cloud computing and body sensor networks
-
Fortino, G., Pathan, M., DiFatta, G.: BodyCloud: integration of cloud computing and body sensor networks. In: Proceedings of IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom 2012), pp. 3–6, Taipei (2012)
-
(2012)
Proceedings of IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom 2012), pp. 3–6, Taipei
-
-
Fortino, G.1
Pathan, M.2
DiFatta, G.3
-
7
-
-
84897560767
-
Integration of Cloud computing and body sensor networks
-
Fortino, G., and Pathan, M., Integration of Cloud computing and body sensor networks. Futur. Gener. Comput. Syst. 35:57–61, 2014.
-
(2014)
Futur. Gener. Comput. Syst.
, vol.35
, pp. 57-61
-
-
Fortino, G.1
Pathan, M.2
-
8
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
Guo, P., Wang, J., Li, B., Lee, S., A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929–936, 2014.
-
(2014)
J. Internet Technol.
, vol.15
, Issue.6
, pp. 929-936
-
-
Guo, P.1
Wang, J.2
Li, B.3
Lee, S.4
-
10
-
-
84961679380
-
-
HAVO: , Available access: 2015/04/1
-
HAVO: http://www.hvc.com.tw/lang/HAVO-E/Home%20HAVO.html, Available access: 2015/04/18
-
-
-
-
11
-
-
84935865949
-
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
-
He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263–277, 2015.
-
(2015)
Inf. Sci.
, vol.321
, pp. 263-277
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
-
12
-
-
84921481484
-
Authentication protocol for ambient assisted living system
-
He, D., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1):71–77, 2015.
-
(2015)
IEEE Commun. Mag.
, vol.35
, Issue.1
, pp. 71-77
-
-
He, D.1
Zeadally, S.2
-
13
-
-
84922001116
-
Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks
-
He, D., Kumar, N., Chen, J., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60, 2015.
-
(2015)
Multimedia Systems
, vol.21
, Issue.1
, pp. 49-60
-
-
He, D.1
Kumar, N.2
Chen, J.3
-
14
-
-
85027949488
-
Robust biometrics-based authentication scheme for multi-server environment
-
He, D., and Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3):816–823, 2015.
-
(2015)
IEEE Syst. J.
, vol.9
, Issue.3
, pp. 816-823
-
-
He, D.1
Wang, D.2
-
15
-
-
84924080806
-
A revised key agreement protocol based on chaotic maps
-
Jabbari, A., and Bagherzadeh, J., A revised key agreement protocol based on chaotic maps. Nonlinear Dyn. 78(1):669–680, 2014.
-
(2014)
Nonlinear Dyn.
, vol.78
, Issue.1
, pp. 669-680
-
-
Jabbari, A.1
Bagherzadeh, J.2
-
16
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
PID: 2332195
-
Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 9897
-
-
Jiang, Q.1
Ma, J.2
Ma, Z.3
Li, G.4
-
17
-
-
84906810339
-
A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks
-
Khan, F.A., Ali, A., Abbas, H., Haldar, N.A.H., A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks. Procedia Comput. Sci. 34:511–517, 2014.
-
(2014)
Procedia Comput. Sci.
, vol.34
, pp. 511-517
-
-
Khan, F.A.1
Ali, A.2
Abbas, H.3
Haldar, N.A.H.4
-
18
-
-
84888642495
-
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
-
Li, C.T., Lee, C.C., Weng, C.Y., An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4): 1133–1143, 2013.
-
(2013)
Nonlinear Dyn.
, vol.74
, Issue.4
, pp. 1133-1143
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
19
-
-
84905560609
-
A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
-
COI: 1:CAS:528:DC%2BC2cXps1Ontr4%3
-
Li, C.T., Lee, C.C., Weng, C.Y., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9):1–11, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.9
, pp. 1-11
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
20
-
-
84939958429
-
An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
-
Li, C.T., Lee, C.W., Shen, J.J., An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn. 80(3):1601–1611, 2015.
-
(2015)
Nonlinear Dyn.
, vol.80
, Issue.3
, pp. 1601-1611
-
-
Li, C.T.1
Lee, C.W.2
Shen, J.J.3
-
21
-
-
84928721359
-
A dynamic identity-based user authentication scheme for remote login systems
-
Li, C.T., Lee, C.C., Weng, C.Y., A dynamic identity-based user authentication scheme for remote login systems. Security and Communication Networks 8(18):3372–3382, 2015.
-
(2015)
Security and Communication Networks
, vol.8
, Issue.18
, pp. 3372-3382
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
22
-
-
84947440526
-
A secure dynamic identity based authentication protocol with smart cards for multi-server architecture
-
Li, C.T., Lee, C.C., Weng, C.Y., Fan, C.I., A secure dynamic identity based authentication protocol with smart cards for multi-server architecture. J. Inf. Sci. Eng. 31(6):1975–1992, 2015.
-
(2015)
J. Inf. Sci. Eng.
, vol.31
, Issue.6
, pp. 1975-1992
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
Fan, C.I.4
-
23
-
-
84935850541
-
A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems
-
Li, C.T., Weng, C.Y., Lee, C.C., A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems. J. Med. Syst. 39(8):1–8, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, Issue.8
, pp. 1-8
-
-
Li, C.T.1
Weng, C.Y.2
Lee, C.C.3
-
24
-
-
84941268418
-
A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system
-
Li, C.T., Weng, C.Y., Lee, C.C., Wang, C.C., A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system. J. Med. Syst. 39(11):1–11, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, Issue.11
, pp. 1-11
-
-
Li, C.T.1
Weng, C.Y.2
Lee, C.C.3
Wang, C.C.4
-
25
-
-
84951986324
-
Design flaws in a secure medical data exchange protocol based on cloud environments. Lect. Notes Comput
-
Li, C.T., Lee, C.C., Wang, C.C., Yang, T.H., Chen, S.J., Design flaws in a secure medical data exchange protocol based on cloud environments. Lect. Notes Comput. Sci. 9532, 2015.
-
(2015)
Sci
, pp. 9532
-
-
Li, C.T.1
Lee, C.C.2
Wang, C.C.3
Yang, T.H.4
Chen, S.J.5
-
26
-
-
84961634519
-
-
Li, C. T., Lee, C. C., Weng, C. Y., A chaotic maps based key agreement and user anonymity protocol without using smart cards and symmetric key en/decryptions. J. Internet Technol., 2015. article in press
-
Li, C. T., Lee, C. C., Weng, C. Y., A chaotic maps based key agreement and user anonymity protocol without using smart cards and symmetric key en/decryptions. J. Internet Technol., 2015. article in press.
-
-
-
-
27
-
-
84891804845
-
Certificateless remote anonymous authentication schemes for wireless body sensor networks
-
Liu, J., Zhang, Z., Chen, X., Kwak, K., Certificateless remote anonymous authentication schemes for wireless body sensor networks. IEEE Transactions on Parallel and Distributed Systems 25(2):332–342, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.2
, pp. 332-342
-
-
Liu, J.1
Zhang, Z.2
Chen, X.3
Kwak, K.4
-
28
-
-
84961595870
-
-
Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst., 2015. article in press
-
Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst., 2015. article in press.
-
-
-
-
29
-
-
80053520387
-
Trust key management scheme for wireless body area networks
-
Mana, M., Feham, M., Bensaber, B.A., Trust key management scheme for wireless body area networks. Int. J. Netw. Security 12(2):75–83, 2011.
-
(2011)
Int. J. Netw. Security
, vol.12
, Issue.2
, pp. 75-83
-
-
Mana, M.1
Feham, M.2
Bensaber, B.A.3
-
30
-
-
77951699595
-
BARI+: a biometric based distributed key management approach for wireless body area networks
-
PID: 2231933
-
Muhammad, K.R.R.S., Lee, H., Lee, S., Lee, Y.K., BARI+: a biometric based distributed key management approach for wireless body area networks. Sensors 10(4):3911–3933, 2010.
-
(2010)
Sensors
, vol.10
, Issue.4
, pp. 3911-3933
-
-
Muhammad, K.R.R.S.1
Lee, H.2
Lee, S.3
Lee, Y.K.4
-
31
-
-
84946499511
-
Application specific study, analysis and classification of body area wireless sensor network applications
-
Nadeem, A., Hussain, M.A., Owais, O., Salam, A., Iqbal, S., Ahsan, K., Application specific study, analysis and classification of body area wireless sensor network applications. Comput. Netw. 83:363–380, 2015.
-
(2015)
Comput. Netw.
, vol.83
, pp. 363-380
-
-
Nadeem, A.1
Hussain, M.A.2
Owais, O.3
Salam, A.4
Iqbal, S.5
Ahsan, K.6
-
32
-
-
34547321272
-
Sensing fabrics for monitoring physiological and biomechanical variables: E-textile solutions
-
Pacelli, M., Loriga, G., Taccini, N., Paradiso, R.: Sensing fabrics for monitoring physiological and biomechanical variables: E-textile solutions. In: 3rd IEEE/EMBS International Summer School on Medical Devices and Biosensors, pp. 1–4, Cambridge (2006)
-
(2006)
3rd IEEE/EMBS International Summer School on Medical Devices and Biosensors, pp. 1–4, Cambridge
-
-
Pacelli, M.1
Loriga, G.2
Taccini, N.3
Paradiso, R.4
-
33
-
-
77649151691
-
Monitoring patients via a secure and mobile healthcare system
-
Ren, Y., Pazzi, R.W.N., Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wirel. Commun. 17(1):59–65, 2010.
-
(2010)
IEEE Wirel. Commun.
, vol.17
, Issue.1
, pp. 59-65
-
-
Ren, Y.1
Pazzi, R.W.N.2
Boukerche, A.3
-
34
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2):317–324, 2015.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.2
, pp. 317-324
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
35
-
-
84961573102
-
-
RFC 2104 - HMAC: Keyed-hashing for message authentication. < >
-
RFC 2104 - HMAC: Keyed-hashing for message authentication.
-
-
-
-
36
-
-
79952089663
-
A study of IEEE 802.15.4 security framework for wireless body area networks
-
PID: 2231935
-
Saleem, S., Ullah, S., Kwak, K.S., A study of IEEE 802.15.4 security framework for wireless body area networks. Sensors 11(2):1383–1395, 2011.
-
(2011)
Sensors
, vol.11
, Issue.2
, pp. 1383-1395
-
-
Saleem, S.1
Ullah, S.2
Kwak, K.S.3
-
37
-
-
84947770508
-
A novel key management protocol in body area networks
-
Shen, J., Moh, S., Chung, I.: A novel key management protocol in body area networks. In: Proceedings of the Seventh International Conference on Networking and Services (ICNS 2011), pp. 246–251, Venice (2011)
-
(2011)
Proceedings of the Seventh International Conference on Networking and Services (ICNS 2011), pp. 246–251, Venice
-
-
Shen, J.1
Moh, S.2
Chung, I.3
-
38
-
-
84922323888
-
A novel routing protocol providing good transmission reliability in underwater sensor networks
-
Shen, J., Tan, H., Wang, J., Lee, S., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1):171–178, 2015.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.1
, pp. 171-178
-
-
Shen, J.1
Tan, H.2
Wang, J.3
Lee, S.4
-
39
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini, S., and Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1):1–11, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
40
-
-
84940848791
-
New authentication scheme for wireless body area networks using the bilinear pairing
-
PID: 2632417
-
Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39:136, 2015.
-
(2015)
J. Med. Syst.
, vol.39
, pp. 136
-
-
Wang, C.1
Zhang, Y.2
-
41
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
PID: 2097892
-
Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
42
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340–352, 2016.
-
(2016)
IEEE Transactions on Parallel and Distributed Systems
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
43
-
-
84888643068
-
Chaotic maps-based three-party password-authenticated key agreement scheme
-
Xie, Q., Zhao, J., Yu, X., Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dyn. 74(4):1021–1027, 2013.
-
(2013)
Nonlinear Dyn.
, vol.74
, Issue.4
, pp. 1021-1027
-
-
Xie, Q.1
Zhao, J.2
Yu, X.3
-
44
-
-
40249103088
-
Cryptanalysis of the public key encryption based on multiple chaotic systems
-
Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons & Fractals 37(3):669–674, 2008.
-
(2008)
Chaos, Solitons & Fractals
, vol.37
, Issue.3
, pp. 669-674
-
-
Zhang, L.1
-
45
-
-
84893021026
-
An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem
-
COI: 1:CAS:528:DC%2BC2cXitV2jsLb
-
Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.2
, pp. 1-7
-
-
Zhao, Z.1
-
46
-
-
84925258369
-
BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks
-
Zhou, J., Cao, Z., Dong, X.: BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks. In: Proceedings of 8th International Conference on Body Area Networks (BodyNets 2013), Boston (2013)
-
(2013)
Proceedings of 8th International Conference on Body Area Networks (BodyNets 2013), Boston
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
-
47
-
-
84929268858
-
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
-
Zhou, J., Cao, Z., Dong, X., Xiong, N., Vasilakos, A.V., 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314: 255–276, 2015.
-
(2015)
Inf. Sci.
, vol.314
, pp. 255-276
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
Xiong, N.4
Vasilakos, A.V.5
-
48
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis, D., and Lekkas, D., Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3): 583–592, 2012.
-
(2012)
Futur. Gener. Comput. Syst.
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
|