-
1
-
-
84936053181
-
Public-key Authentication for Cloud-based WBANs
-
London, UK, 29 September–1 October 2014; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium
-
Hayajneh, T.; Vasilakos, A.V.; Almashaqbeh, G.; Mohd, B.J.; Imran, M.A.; Shakir, M.Z.; Qaraqe, K.A. Public-key Authentication for Cloud-based WBANs. In Proceedings of the 9th International Conference on Body Area Networks, London, UK, 29 September–1 October 2014; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2014; p. 286–292.
-
(2014)
Proceedings of the 9Th International Conference on Body Area Networks
, pp. 286-292
-
-
Hayajneh, T.1
Vasilakos, A.V.2
Almashaqbeh, G.3
Mohd, B.J.4
Imran, M.A.5
Shakir, M.Z.6
Qaraqe, K.A.7
-
2
-
-
79951723271
-
Survey on wireless body area networks
-
Latré, B.; Braem, B.; Moerman, I.; Blondia, C.; Demeester, P. A survey on wireless body area networks. Wirel. Netw. 2011, 17, 1–18.
-
(2011)
Wirel. Netw
, vol.17
, pp. 1-18
-
-
Latré, B.1
Braem, B.2
Moerman, I.3
Blondia, C.4
Demeester, P.A.5
-
3
-
-
84864035796
-
Comprehensive survey of wireless body area networks
-
Ullah, S.; Higgins, H.; Braem, B.; Latre, B.; Blondia, C.; Moerman, I.; Saleem, S.; Rahman, Z.; Kwak, K.S. A comprehensive survey of wireless body area networks. J. Med. Syst. 2012, 36, 1065–1094.
-
(2012)
J. Med. Syst
, vol.36
, pp. 1065-1094
-
-
Ullah, S.1
Higgins, H.2
Braem, B.3
Latre, B.4
Blondia, C.5
Moerman, I.6
Saleem, S.7
Rahman, Z.8
Kwak, K.9
-
4
-
-
84885589116
-
Cloud-enabled wireless body area networks for pervasive healthcare
-
Wan, J.; Zou, C.; Ullah, S.; Lai, C.F.; Zhou, M.; Wang, X. Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Netw. 2013, 27, 56–61.
-
(2013)
IEEE Netw
, vol.27
, pp. 56-61
-
-
Wan, J.1
Zou, C.2
Ullah, S.3
Lai, C.F.4
Zhou, M.5
Wang, X.6
-
5
-
-
80052014745
-
Low-Cost Remote Patient Monitoring System Based on Reduced Platform Computer Technology
-
Jacob, N.A.; Pillai, V.; Nair, S.; Harrell, D.T.; Delhommer, R.; Chen, B.; Sanchez, I.; Almstrum, V.; Gopalan, S. Low-Cost Remote Patient Monitoring System Based on Reduced Platform Computer Technology. Telemed. e-Health 2011, 17, 536–545.
-
(2011)
Telemed. E-Health
, vol.17
, pp. 536-545
-
-
Jacob, N.A.1
Pillai, V.2
Nair, S.3
Harrell, D.T.4
Delhommer, R.5
Chen, B.6
Sanchez, I.7
Almstrum, V.8
Gopalan, S.9
-
6
-
-
84888322916
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
Dinh, H.T.; Lee, C.; Niyato, D.; Wang, P. A survey of mobile cloud computing: Architecture, applications, and approaches. Wirel. Commun. Mobile Comput. 2013, 13, 1587–1611.
-
(2013)
Wirel. Commun. Mobile Comput
, vol.13
, pp. 1587-1611
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
7
-
-
84880579098
-
MHealthMon: Toward Energy-Efficient and Distributed Mobile Health Monitoring Using Parallel Offloading
-
Ahnn, J.H.; Potkonjak, M. mHealthMon: Toward Energy-Efficient and Distributed Mobile Health Monitoring Using Parallel Offloading. J. Med. Syst. 2013, 37, 1–11.
-
(2013)
J. Med. Syst
, vol.37
, pp. 1-11
-
-
Ahnn, J.H.1
Potkonjak, M.2
-
8
-
-
84921067887
-
Cloud-assisted body area networks: State-of-the-art and future challenges
-
Fortino, G.; di Fatta, G.; Pathan, M.; Vasilakos, A. Cloud-assisted body area networks: State-of-the-art and future challenges. Wirel. Netw. 2014, 20, 1925–1938.
-
(2014)
Wirel. Netw
, vol.20
, pp. 1925-1938
-
-
Fortino, G.1
Di Fatta, G.2
Pathan, M.3
Vasilakos, A.4
-
9
-
-
84910146997
-
Survey of wireless technologies coexistence in WBAN
-
Hayajneh, T.; Almashaqbeh, G.; Ullah, S.; Vasilakos, A. A survey of wireless technologies coexistence in WBAN: Analysis and open research issues. Wirel. Netw. 2014, 20, 2165–2199.
-
(2014)
Analysis and Open Research Issues. Wirel. Netw
, vol.20
, pp. 2165-2199
-
-
Hayajneh, T.1
Almashaqbeh, G.2
Ullah, S.3
Vasilakos, A.A.4
-
10
-
-
84898825587
-
Mobile Cloud Computing: A Survey, State of Art and Future Directions
-
Rahimi, M.; Ren, J.; Liu, C.; Vasilakos, A.; Venkatasubramanian, N. Mobile Cloud Computing: A Survey, State of Art and Future Directions. Mobile Netw. Appl. 2014, 19, 133–143.
-
(2014)
Mobile Netw. Appl
, vol.19
, pp. 133-143
-
-
Rahimi, M.1
Ren, J.2
Liu, C.3
Vasilakos, A.4
Venkatasubramanian, N.5
-
11
-
-
84936767763
-
QoS-aware health monitoring system using cloud-based WBANs
-
Almashaqbeh, G.; Hayajneh, T.; Vasilakos, A.V.; Mohd, B.J. QoS-aware health monitoring system using cloud-based WBANs. J. Med. Syst. 2014, 38, 1–20.
-
(2014)
J. Med. Syst
, vol.38
, pp. 1-20
-
-
Almashaqbeh, G.1
Hayajneh, T.2
Vasilakos, A.V.3
Mohd, B.J.4
-
12
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
Wei, L.; Zhu, H.; Cao, Z.; Dong, X.; Jia, W.; Chen, Y.; Vasilakos, A.V. Security and privacy for storage and computation in cloud computing. Inf. Sci. 2014, 258, 371–386.
-
(2014)
Inf. Sci
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
13
-
-
84930705771
-
Security and Privacy Issues in Implantable Medical Devices
-
Camara, C.; Peris-Lopez, P.; Tapiador, J.E. Security and Privacy Issues in Implantable Medical Devices. J. Biomed. Inform. 2015, 55, 272–289.
-
(2015)
J. Biomed. Inform
, vol.55
, pp. 272-289
-
-
Camara, C.1
Peris-Lopez, P.2
Tapiador, J.E.3
-
14
-
-
84943778934
-
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues
-
Mohd, B.J.; Hayajneh, T.; Vasilakos, A.V. A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. J. Netw. Comput. Appl. 2015, 58, 73–93.
-
(2015)
J. Netw. Comput. Appl
, vol.58
, pp. 73-93
-
-
Mohd, B.J.1
Hayajneh, T.2
Vasilakos, A.V.3
-
15
-
-
84860494264
-
Key factors influencing the implementation success of a home telecare application
-
Postema, T.; Peeters, J.; Friele, R. Key factors influencing the implementation success of a home telecare application. Int. J. Med. Inform. 2012, 81, 415–423.
-
(2012)
Int. J. Med. Inform
, vol.81
, pp. 415-423
-
-
Postema, T.1
Peeters, J.2
Friele, R.3
-
17
-
-
84892621763
-
A Novel and Lightweight System to Secure Wireless Medical Sensor Networks
-
He, D.; Chan, S.; Tang, S. A Novel and Lightweight System to Secure Wireless Medical Sensor Networks. IEEE J. Biomed. Health Inform. 2014, 18, 316–326.
-
(2014)
IEEE J. Biomed. Health Inform
, vol.18
, pp. 316-326
-
-
He, D.1
Chan, S.2
Tang, S.3
-
18
-
-
85015880452
-
Elliptic and Hyperelliptic Curves on Embedded uP. ACM Trans
-
Wollinger, T.; Pelzl, J.; Wittelsberger, V.; Paar, C.; Saldamli, G.; Koc, C. Elliptic and Hyperelliptic Curves on Embedded uP. ACM Trans. Embed. Comput. Syst. 2004, 3, 509–533.
-
(2004)
Embed. Comput. Syst
, vol.3
, pp. 509-533
-
-
Wollinger, T.1
Pelzl, J.2
Wittelsberger, V.3
Paar, C.4
Saldamli, G.5
Koc, C.6
-
19
-
-
84908621929
-
A Provably-Secure ECC-Based Authentication Scheme forWireless Sensor Networks
-
Nam, J.; Kim, M.; Paik, J.; Lee, Y.; Won, D. A Provably-Secure ECC-Based Authentication Scheme forWireless Sensor Networks. Sensors 2014, 14, 21023–21044.
-
(2014)
Sensors
, vol.14
, pp. 21023-21044
-
-
Nam, J.1
Kim, M.2
Paik, J.3
Lee, Y.4
Won, D.5
-
20
-
-
80052170264
-
Efficient Group Key Management and Authentication for Body Sensor Networks
-
Kyoto, Japan, 5–9 June
-
Keoh, S.L. Efficient Group Key Management and Authentication for Body Sensor Networks. In Proceedings of the IEEE International Conference on Communications, Kyoto, Japan, 5–9 June 2011; p. 1–6.
-
(2011)
Proceedings of the IEEE International Conference on Communications
, pp. 1-6
-
-
Keoh, S.L.1
-
21
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R.L.; Shamir, A.; Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 1978, 21, 120–126.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
23944459661
-
Public key cryptography in sensor networks—Revisited
-
Heidelberg, Germany
-
Gaubatz, G.; Kaps, J.; Sunar, B. Public key cryptography in sensor networks—Revisited. In Security in Ad-hoc and Sensor Networks; Springer: Heidelberg, Germany, 2004; p. 2–18.
-
(2004)
In Security in Ad-Hoc and Sensor Networks; Springer
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.2
Sunar, B.3
-
23
-
-
84940883191
-
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System
-
Amin, R.; Islam, S.; Biswas, G.; Khan, M.; Obaidat, M. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System. J. Med. Syst. 2015, 39, doi:10.1007/s10916-015-0307-2.
-
(2015)
J. Med. Syst
, pp. 39
-
-
Amin, R.1
Islam, S.2
Biswas, G.3
Khan, M.4
Obaidat, M.5
-
24
-
-
84863271667
-
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
-
Kumar, P.; Lee, S.G.; Lee, H.J. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks. Sensors 2012, 12, 1625–1647.
-
(2012)
Sensors
, vol.12
, pp. 1625-1647
-
-
Kumar, P.1
Lee, S.G.2
Lee, H.J.3
-
25
-
-
84930216224
-
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity forWireless Body Area Networks
-
Xiong, H.; Qin, Z. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity forWireless Body Area Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1442–1455.
-
(2015)
IEEE Trans. Inf. Forensics Secur
, vol.10
, pp. 1442-1455
-
-
Xiong, H.1
Qin, Z.2
-
26
-
-
84891804845
-
Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
-
Liu, J.; Zhang, Z.; Chen, X.; Kwak, K.S. Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 332–342.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, pp. 332-342
-
-
Liu, J.1
Zhang, Z.2
Chen, X.3
Kwak, K.S.4
-
27
-
-
84930202100
-
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol
-
Xiong, H. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol. IEEE Trans. Inf. Forensics Secur. 2014, 9, 2327–2339.
-
(2014)
IEEE Trans. Inf. Forensics Secur
, vol.9
, pp. 2327-2339
-
-
Xiong, H.1
-
28
-
-
49249112788
-
Remote Client Authentication
-
Weigold, T.; Kramp, T.; Baentsch, M. Remote Client Authentication. IEEE Secur. Priv. 2008, 6, 36–43.
-
(2008)
IEEE Secur. Priv
, vol.6
, pp. 36-43
-
-
Weigold, T.1
Kramp, T.2
Baentsch, M.3
-
29
-
-
84961616537
-
-
accessed on 22 March
-
G DATA Mobile Malware Report for the First Quarter of 2015. Available online: https://www.gdata-software.com/g-data/newsroom/news/article/g-data-releases-mobile-malware-report-for-the-first-quarter-of-2015 (accessed on 22 March 2016).
-
(2016)
-
-
-
30
-
-
84903633037
-
TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks. Wirel. Pers
-
Ma, L.; Ge, Y.; Zhu, Y. TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks. Wirel. Pers. Commun. 2014, 6, 1077–1090.
-
(2014)
Commun
, vol.6
, pp. 1077-1090
-
-
Ma, L.1
Ge, Y.2
Zhu, Y.3
-
31
-
-
84906789059
-
Scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks
-
Han, N.D.; Han, L.; Tuan, D.M.; In, H.P.; Jo, M. A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks. Inf. Sci. 2014, 284, 157–166.
-
(2014)
Inf. Sci
, vol.284
, pp. 157-166
-
-
Han, N.D.1
Han, L.2
Tuan, D.M.3
In, H.P.4
Jo, M.A.5
-
32
-
-
84863512174
-
ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks
-
He, D.; Chen, C.; Chan, S.; Bu, J.; Vasilakos, A. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 2012, 16, 623–632.
-
(2012)
IEEE Trans. Inf. Technol. Biomed
, vol.16
, pp. 623-632
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
Vasilakos, A.5
-
33
-
-
84896480048
-
A hybrid and secure priority-guaranteed MAC protocol for wireless body area network
-
Ullah, S.; Imran, M.; Alnuem, M. A hybrid and secure priority-guaranteed MAC protocol for wireless body area network. Int. J. Distrib. Sens. Netw. 2014, 2014, doi:10.1155/2014/481761.
-
(2014)
Int. J. Distrib. Sens. Netw
, pp. 2014
-
-
Ullah, S.1
Imran, M.2
Alnuem, M.3
-
34
-
-
84870926798
-
ECG-Cryptography and Authentication in Body Area Networks
-
Zhang, Z.; Wang, H.; Vasilakos, A.; Fang, H. ECG-Cryptography and Authentication in Body Area Networks. IEEE Trans. Inf. Technol. Biomed. 2012, 16, 1070–1078.
-
(2012)
IEEE Trans. Inf. Technol. Biomed
, vol.16
, pp. 1070-1078
-
-
Zhang, Z.1
Wang, H.2
Vasilakos, A.3
Fang, H.4
-
35
-
-
84883408567
-
Bana: Body area network authentication exploiting channel characteristics
-
Shi, L.; Li, M.; Yu, S.; Yuan, J. Bana: Body area network authentication exploiting channel characteristics. IEEE J. Sel. Areas Commun. 2013, 31, 1803–1816.
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, pp. 1803-1816
-
-
Shi, L.1
Li, M.2
Yu, S.3
Yuan, J.4
-
36
-
-
84876065473
-
Secure ad hoc trust initialization and key management in wireless body area networks
-
Li, M.; Yu, S.; Guttman, J.D.; Lou, W.; Ren, K. Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Netw. 2013, 9, doi:10.1145/2422966.2422975.
-
(2013)
ACM Trans. Sens. Netw
, pp. 9
-
-
Li, M.1
Yu, S.2
Guttman, J.D.3
Lou, W.4
Ren, K.5
-
37
-
-
76849098534
-
PSKA: Usable and secure key agreement scheme for body area networks
-
Venkatasubramanian, K.K.; Banerjee, A.; Gupta, S.K.S. PSKA: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 2010, 14, 60–68.
-
(2010)
IEEE Trans. Inf. Technol. Biomed
, vol.14
, pp. 60-68
-
-
Venkatasubramanian, K.K.1
Banerjee, A.2
Gupta, S.3
-
38
-
-
84940203165
-
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
-
Chen, H.; Ge, L.; Xie, L. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks. Sensors 2015, 15, 17057–17075.
-
(2015)
Sensors
, vol.15
, pp. 17057-17075
-
-
Chen, H.1
Ge, L.2
Xie, L.3
-
39
-
-
20344381294
-
A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
-
Santa Clara, CA, USA, 4–7 October
-
Malan, D.J.; Welsh, M.; Smith, M.D. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In Proceedings of the SECON, Santa Clara, CA, USA, 4–7 October 2004.
-
(2004)
Proceedings of the SECON
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
40
-
-
70349646298
-
Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network
-
Malasri, K.; Wang, L. Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network. Sensors 2009, 9, 6273–6297.
-
(2009)
Sensors
, vol.9
, pp. 6273-6297
-
-
Malasri, K.1
Wang, L.2
-
41
-
-
70449562519
-
IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks
-
Tan, C.; Wang, H.; Zhong, S.; Li, Q. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 2009, 13, 926–932.
-
(2009)
IEEE Trans. Inf. Technol. Biomed
, vol.13
, pp. 926-932
-
-
Tan, C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
42
-
-
79953065589
-
An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare
-
Le, X.H.; Khalid, M.; Sankar, R.; Lee, S. An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J. Netw. 2011, 6, 355–364.
-
(2011)
J. Netw
, vol.6
, pp. 355-364
-
-
Le, X.H.1
Khalid, M.2
Sankar, R.3
Lee, S.4
-
43
-
-
84863011893
-
Security Issues in Healthcare Applications UsingWireless Medical Sensor Networks
-
Kumar, P.; Lee, H.J. Security Issues in Healthcare Applications UsingWireless Medical Sensor Networks: A Survey. Sensors 2011, 12, 55–91.
-
(2011)
A Survey. Sensors
, vol.12
, pp. 55-91
-
-
Kumar, P.1
Lee, H.J.2
-
44
-
-
84893906839
-
An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications
-
Kumar, P.; Ylianttila, M.; Gurtov, A.; Lee, S.G.; Lee, H.J. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications. Sensors 2014, 14, 2732–2755.
-
(2014)
Sensors
, vol.14
, pp. 2732-2755
-
-
Kumar, P.1
Ylianttila, M.2
Gurtov, A.3
Lee, S.G.4
Lee, H.J.5
-
45
-
-
77951273083
-
On limited-range strategic/random jamming attacks in wireless ad hoc networks
-
Zurich, Switzerland, 20–23 October
-
Panyim, K.; Hayajneh, T.; Krishnamurthy, P.; Tipper, D. On limited-range strategic/random jamming attacks in wireless ad hoc networks. In Proceedings of the IEEE 34th Conference on Local Computer Networks, Zurich, Switzerland, 20–23 October 2009; p. 922–929.
-
(2009)
Proceedings of the IEEE 34Th Conference on Local Computer Networks
, pp. 922-929
-
-
Panyim, K.1
Hayajneh, T.2
Krishnamurthy, P.3
Tipper, D.4
-
46
-
-
70449491089
-
Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks
-
Dresden, Germany, 14–18 June
-
Hayajneh, T.; Krishnamurthy, P.; Tipper, D.; Kim, T. Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks. In Proceedings of the IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009; p. 1–6.
-
(2009)
Proceedings of the IEEE International Conference on Communications
, pp. 1-6
-
-
Hayajneh, T.1
Krishnamurthy, P.2
Tipper, D.3
Kim, T.4
-
47
-
-
84941025368
-
Green Approach for Selfish Misbehavior Detection in 802. A11-Based Wireless Networks
-
Hayajneh, T.; Almashaqbeh, G.; Ullah, S. A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks. Mobile Netw. Appl. 2015, 20, 623–635.
-
(2015)
Mobile Netw. Appl
, vol.20
, pp. 623-635
-
-
Hayajneh, T.1
Almashaqbeh, G.2
Ullah, S.A.3
-
48
-
-
84861884161
-
Secure neighborhood creation in wireless ad hoc networks using hop count discrepancies
-
Hayajneh, T.; Krishnamurthy, P.; Tipper, D.; Le, A. Secure neighborhood creation in wireless ad hoc networks using hop count discrepancies. Mobile Netw. Appl. 2012, 17, 415–430.
-
(2012)
Mobile Netw. Appl
, vol.17
, pp. 415-430
-
-
Hayajneh, T.1
Krishnamurthy, P.2
Tipper, D.3
Le, A.4
-
49
-
-
72849152308
-
Deworm: A simple protocol to detect wormhole attacks in wireless ad hoc networks
-
Gold Coast, Australia, 19–21 October
-
Hayajneh, T.; Krishnamurthy, P.; Tipper, D. Deworm: A simple protocol to detect wormhole attacks in wireless ad hoc networks. In Proceedings of the IEEE 3rd International Conference on Network and System Security, Gold Coast, Australia, 19–21 October 2009; p. 73–80.
-
(2009)
Proceedings of the IEEE 3Rd International Conference on Network and System Security
, pp. 73-80
-
-
Hayajneh, T.1
Krishnamurthy, P.2
Tipper, D.3
-
50
-
-
79960410572
-
Source—Destination obfuscation in wireless ad hoc networks
-
Hayajneh, T.; Doomun, R.; Krishnamurthy, P.; Tipper, D. Source—Destination obfuscation in wireless ad hoc networks. Secur. Commun. Netw. 2011, 4, 888–901.
-
(2011)
Secur. Commun. Netw
, vol.4
, pp. 888-901
-
-
Hayajneh, T.1
Doomun, R.2
Krishnamurthy, P.3
Tipper, D.4
-
51
-
-
70449481059
-
Secloud: Source and destination seclusion using clouds for wireless ad hoc networks
-
Sousse, Tunisia, 5–8 July
-
Doomun, R.; Hayajneh, T.; Krishnamurthy, P.; Tipper, D. Secloud: Source and destination seclusion using clouds for wireless ad hoc networks. In Proceedings of the IEEE Symposium on Computers and Communications, Sousse, Tunisia, 5–8 July 2009; p. 361–367.
-
(2009)
Proceedings of the IEEE Symposium on Computers and Communications
, pp. 361-367
-
-
Doomun, R.1
Hayajneh, T.2
Krishnamurthy, P.3
Tipper, D.4
-
52
-
-
84893021026
-
An Efficient Anonymous Authentication Scheme forWireless Body Area Networks Using Elliptic Curve Cryptosystem
-
Zhao, Z. An Efficient Anonymous Authentication Scheme forWireless Body Area Networks Using Elliptic Curve Cryptosystem. J. Med. Syst. 2014, 38, doi:10.1007/s10916-014-0013-5.
-
(2014)
J. Med. Syst
, pp. 38
-
-
Zhao, Z.1
-
53
-
-
84904116666
-
Secure personal health information sharing with patient-centric access control in cloud computing
-
Atlanta, GA, USA, 9–13 December
-
Barua, M.; Lu, R.; Shen, X. SPS: Secure personal health information sharing with patient-centric access control in cloud computing. In Proceedings of the Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; p. 647–652.
-
(2013)
Proceedings of the Global Communications Conference (GLOBECOM)
, pp. 647-652
-
-
Barua, M.1
Lu, R.2
Shen, X.3
-
54
-
-
84925235936
-
Modeling of WBAN and Cloud Integration for Secure and Reliable Healthcare
-
UMass Club, MA, USA, 30 September–2 October
-
Divi, K.; Liu, H. Modeling of WBAN and Cloud Integration for Secure and Reliable Healthcare. In Proceedings of the BodyNets, UMass Club, MA, USA, 30 September–2 October 2013; p. 128–131.
-
(2013)
Proceedings of the Bodynets
, pp. 128-131
-
-
Divi, K.1
Liu, H.2
-
55
-
-
84868125268
-
A Hybrid Authentication and Key Establishment Scheme for WBAN
-
Liverpool, UK, 25–27 June
-
Drira, W.; Renault, E.; Zeghlache, D. A Hybrid Authentication and Key Establishment Scheme for WBAN. In Proceedings of the TrustCom, Liverpool, UK, 25–27 June 2012; p. 78–83.
-
(2012)
Proceedings of the Trustcom
, pp. 78-83
-
-
Drira, W.1
Renault, E.2
Zeghlache, D.3
-
56
-
-
84876796310
-
U-Healthcare System: State-of-the-Art Review and Challenges
-
Touati, F.; Tabish, R. U-Healthcare System: State-of-the-Art Review and Challenges. J. Med. Syst. 2013, 37, 1–20.
-
(2013)
J. Med. Syst
, vol.37
, pp. 1-20
-
-
Touati, F.1
Tabish, R.2
-
57
-
-
0003614758
-
Digitalized Signatures and Public Key Functions as Intractable as Factorization
-
Reading, MA, USA
-
Rabin, M. Digitalized Signatures and Public Key Functions as Intractable as Factorization; Massachusetts Institute of Technology: Reading, MA, USA, 1979.
-
(1979)
Massachusetts Institute of Technology
-
-
Rabin, M.1
-
58
-
-
84944878354
-
-
Waterloo, ON, Canada
-
Menezes, A.J.; van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press: Waterloo, ON, Canada, 2001.
-
(2001)
Handbook of Applied Cryptography; CRC Press
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
59
-
-
84999466301
-
Security on FPGAs: State-of-the-art Implementations and Attacks
-
Wollinger, T.; Guajardo, J.; Paar, C. Security on FPGAs: State-of-the-art Implementations and Attacks. ACM Trans. Embed. Comput. Syst. 2004, 3, 534–574.
-
(2004)
ACM Trans. Embed. Comput. Syst
, vol.3
, pp. 534-574
-
-
Wollinger, T.1
Guajardo, J.2
Paar, C.3
-
60
-
-
84897638271
-
Analysis and modeling of FPGA implementations of spatial steganography methods
-
Mohd, B.J.; Hayajneh, T.; Abed, S.; Itradat, A. Analysis and modeling of FPGA implementations of spatial steganography methods. J. Circuits Syst. Comput. 2014, 23, doi: 10.1142/S0218126614500182.
-
(2014)
J. Circuits Syst. Comput
, pp. 23
-
-
Mohd, B.J.1
Hayajneh, T.2
Abed, S.3
Itradat, A.4
-
61
-
-
84962356004
-
Comparative Study of Steganography Designs Based on Multiple FPGA Platforms
-
Mohd, B.J.; Hayajneh, T.; Abu Khalaf, Z.; Vasilakos, A.V. A Comparative Study of Steganography Designs Based on Multiple FPGA Platforms. Int. J. Electron. Secur. Digit. Forensics 2016, 8, 164–190.
-
(2016)
Int. J. Electron. Secur. Digit. Forensics
, vol.8
, pp. 164-190
-
-
Mohd, B.J.1
Hayajneh, T.2
Abu Khalaf, Z.3
Vasilakos, A.4
-
62
-
-
84961668818
-
-
FPGA, SoC, and CPLD from Altera, accessed on 22 March
-
Altera Inc. FPGA, SoC, and CPLD from Altera. Available online: ftp://ftp.altera.com/up/pub/Altera-Material/10.1/Tutorials/Verilog/ModelSim-GUI-Introduction.pdf (accessed on 22 March 2016).
-
(2016)
-
-
-
63
-
-
84961592139
-
-
accessed on 22 March
-
Cyclone II Architecture. Available online: http://www.altera.com/literature/hb/cyc2/cyc2-cii51002.pdf (accessed on 22 March 2016).
-
(2016)
-
-
-
65
-
-
85027050059
-
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications
-
Hayajneh, T.; Ullah, S.; Mohd, B.; Balagani, K. An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications. IEEE Syst. J. 2015, doi:10.1109/JSYST.2015.2424702.
-
(2015)
IEEE Syst. J
-
-
Hayajneh, T.1
Ullah, S.2
Mohd, B.3
Balagani, K.4
-
66
-
-
84876480614
-
FPGA Implementation and Energy Cost Analysis of Two Light-Weight Involutional Block Ciphers Targeted to Wireless Sensor Networks
-
Zhang, X.; Heys, H.M.; Li, C. FPGA Implementation and Energy Cost Analysis of Two Light-Weight Involutional Block Ciphers Targeted to Wireless Sensor Networks. Mobile Netw. Appl. 2013, 18, 222–234.
-
(2013)
Mobile Netw. Appl
, vol.18
, pp. 222-234
-
-
Zhang, X.1
Heys, H.M.2
Li, C.3
-
67
-
-
84892981941
-
Wavelet-transform steganography: Algorithm and hardware implementation
-
Mohd, B.J.; Hayajneh, T. Wavelet-transform steganography: Algorithm and hardware implementation. Int. J. Electron. Secur. Digit. Forensics 2013, 5, 241–256.
-
(2013)
Int. J. Electron. Secur. Digit. Forensics
, vol.5
, pp. 241-256
-
-
Mohd, B.J.1
Hayajneh, T.2
-
68
-
-
84867673199
-
Low powerWallace multiplier design based on wide counters
-
Abed, S.; Mohd, B.J.; Al-bayati, Z.; Alouneh, S. Low powerWallace multiplier design based on wide counters. Int. J. Circuit Theory Appl. 2012, 40, 1175–1185.
-
(2012)
Int. J. Circuit Theory Appl
, vol.40
, pp. 1175-1185
-
-
Abed, S.1
Mohd, B.J.2
Al-Bayati, Z.3
Alouneh, S.4
-
69
-
-
84933518959
-
Optimization and modeling of FPGA implementation of the Katan Cipher
-
Amman, Jordan, 7–9 April
-
Mohd, B.; Hayajneh, T.; Abu Khalaf, Z. Optimization and modeling of FPGA implementation of the Katan Cipher. In Proceedings of the 6th International Conference on Information and Communication Systems, Amman, Jordan, 7–9 April 2015; p. 68–72.
-
(2015)
Proceedings of the 6Th International Conference on Information and Communication Systems
, pp. 68-72
-
-
Mohd, B.1
Hayajneh, T.2
Abu Khalaf, Z.3
-
70
-
-
84910668271
-
An energy-efficient and security aware route selection protocol for wireless sensor networks
-
Hayajneh, T.; Doomun, R.; Al-Mashaqbeh, G.; Mohd, B.J. An energy-efficient and security aware route selection protocol for wireless sensor networks. Secur. Commun. Netw. 2014, 7, 2015–2038.
-
(2014)
Secur. Commun. Netw
, vol.7
, pp. 2015-2038
-
-
Hayajneh, T.1
Doomun, R.2
Al-Mashaqbeh, G.3
Mohd, B.J.4
-
71
-
-
53149137371
-
Popovici, E. Hardware-Software Implementation of Public-Key Cryptography forWireless Sensor Networks
-
Dublin, Ireland, 28–30 June
-
Murphy, G.; Keeshan, A.; Agarwal, R.; Popovici, E. Hardware-Software Implementation of Public-Key Cryptography forWireless Sensor Networks. In Proceedings of the Irish Signals and Systems Conference, Dublin, Ireland, 28–30 June 2006; p. 463–468.
-
(2006)
Proceedings of the Irish Signals and Systems Conference
, pp. 463-468
-
-
Murphy, G.1
Keeshan, A.2
Agarwal, R.3
-
72
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
Kauai Island, HI, USA, 8–12 March
-
Gaubatz, G.; Kaps, J.; Ozturk, E.; Sunar, B. State of the art in ultra-low power public key cryptography for wireless sensor networks. In Proceedings of the IEEE 3rd International Conference on Pervasive Computing and Communications Workshops, Kauai Island, HI, USA, 8–12 March 2005; p. 146–150.
-
(2005)
Proceedings of the IEEE 3Rd International Conference on Pervasive Computing and Communications Workshops
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.2
Ozturk, E.3
Sunar, B.4
-
73
-
-
84962807178
-
Energy model for light-weight block ciphers for WBAN applications
-
Athens, Greece, 3–5 November
-
Mohd, B.; Hayajneh, T.; Shakir, M.; Qaraqe, K.; Vasilakos, A. Energy model for light-weight block ciphers for WBAN applications. In Proceedings of the 2014 EAI 4th International Conference onWireless Mobile Communication and Healthcare (Mobihealth), Athens, Greece, 3–5 November 2014; p. 1–4.
-
(2014)
Proceedings of the 2014 EAI 4Th International Conference Onwireless Mobile Communication and Healthcare (Mobihealth)
, pp. 1-4
-
-
Mohd, B.1
Hayajneh, T.2
Shakir, M.3
Qaraqe, K.4
Vasilakos, A.5
-
74
-
-
84961604308
-
-
accessed on 22 March
-
Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL). Available online: http://indigo.ie/mscott/ (accessed on 22 March 2016).
-
(2016)
-
-
-
75
-
-
61649124331
-
Experimental Study of the Impact of WLAN Interference on IEEE 802 15 4 Body Area Networks
-
Springer: Berlin, Germany; Heidelberg, Germany
-
Hauer, J.H.; Handziski, V.; Wolisz, A. Experimental Study of the Impact of WLAN Interference on IEEE 802.15.4 Body Area Networks. In Wireless Sensor Networks; Springer: Berlin, Germany; Heidelberg, Germany, 2009; Volume 5432, p. 17–32.
-
(2009)
Wireless Sensor Networks
, vol.5432
, pp. 17-32
-
-
Hauer, J.H.1
Handziski, V.2
Wolisz, A.3
-
76
-
-
77955190053
-
A context aware wireless body area network (BAN)
-
London, UK, 1–3 April
-
O’Donovan, T.; O’Donoghue, J.; Sreenan, C.; Sammon, D.; O’Reilly, P.; O’Connor, K. A context aware wireless body area network (BAN). In Proceedings of the Pervasive Health, London, UK, 1–3 April 2009; p. 1–8.
-
(2009)
Proceedings of the Pervasive Health
, pp. 1-8
-
-
O’Donovan, T.1
O’Donoghue, J.2
Sreenan, C.3
Sammon, D.4
O’Reilly, P.5
O’Connor, K.6
-
77
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A.; Szewczyk, R.; Tygar, J.; Wen, V.; Culler, D.E. SPINS: Security protocols for sensor networks. Wirel. Netw. 2002, 8, 521–534.
-
(2002)
Wirel. Netw
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.E.5
-
78
-
-
0001263548
-
A Certified Digital Signature
-
Santa Barbara, CA, USA, 20–24 August 1989; Springer: New York, NY, USA
-
Merkle, R. A Certified Digital Signature. In Proceedings of the CRYPTO, Santa Barbara, CA, USA, 20–24 August 1989; Springer: New York, NY, USA, 1989; p. 218–238.
-
(1989)
Proceedings of the CRYPTO
, pp. 218-238
-
-
Merkle, R.1
-
79
-
-
29844457287
-
An efficient scheme for authenticating public keys in sensor networks
-
Urbana-Champaign, IL, USA, 25–28 May
-
Du, W.; Wang, R.; Ning, P. An efficient scheme for authenticating public keys in sensor networks. In Proceedings of the MobiHoc, Urbana-Champaign, IL, USA, 25–28 May 2005; p. 58–67.
-
(2005)
Proceedings of the Mobihoc
, pp. 58-67
-
-
Du, W.1
Wang, R.2
Ning, P.3
|