-
1
-
-
77950214738
-
-
Advanced encryption standard (AES). ( Nov. 26
-
Advanced encryption standard (AES). (2001, Nov. 26). FIPS PUB 197 [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
-
(2001)
FIPS PUB 197
-
-
-
2
-
-
84891887618
-
A k-anonymity privacy-preserving approach in wireless medical monitoring environments
-
P. Belsis and G. Pantziou, "A k-anonymity privacy-preserving approach in wireless medical monitoring environments, " J. Personal Ubiquitous Comput., vol. 18, no. 1, pp. 61-74, 2014.
-
(2014)
J. Personal Ubiquitous Comput.
, vol.18
, Issue.1
, pp. 61-74
-
-
Belsis, P.1
Pantziou, G.2
-
3
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
D. Bogdanov, S. Laur, and J. Willemson, "Sharemind: A framework for fast privacy-preserving computations, " in Proc. 13th Eur. Symp. Res. Comput. Security, 2008, pp. 192-206.
-
(2008)
Proc. 13th Eur. Symp. Res. Comput. Security
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
4
-
-
33749537534
-
A programmable service architecture for mobile medical care
-
Pisa, Italy, Mar. 13-17
-
R. Chakravorty, "A programmable service architecture for mobile medical care, " in Proc. 4th Annu. IEEE Int. Conf. Pervasive Comput. Commun. Workshop, Pisa, Italy, Mar. 13-17, 2006, pp. 532-536.
-
(2006)
Proc. 4th Annu. IEEE Int. Conf. Pervasive Comput. Commun. Workshop
, pp. 532-536
-
-
Chakravorty, R.1
-
6
-
-
84942511778
-
Permutation-based encryption, authentication and authenticated encryption
-
Jul. 6 Stockholm, Sweden
-
J. Daemen, G. Bertoni, M. Peeters, and G. V. Assche. (2012, Jul. 6). Permutation-based encryption, authentication and authenticated encryption. Proc. Directions Authenticated Ciphers, Stockholm, Sweden [Online]. Available: http://www.hyperelliptic.org/DIAC/slides/PermutationDIAC2012.pdf
-
(2012)
Proc. Directions Authenticated Ciphers
-
-
Daemen, J.1
Bertoni, G.2
Peeters, M.3
Assche, G.V.4
-
7
-
-
55049120451
-
Real-Time and secure wireless health monitoring
-
Jan
-
S. Dagtas, G. Pekhteryev, Z. Sahinoglu, H. Cam, and N. Challa, "Real-Time and secure wireless health monitoring, " Int. J. Telemed. Appl., pp. 1-10, Jan. 2008.
-
(2008)
Int. J. Telemed. Appl.
, pp. 1-10
-
-
Dagtas, S.1
Pekhteryev, G.2
Sahinoglu, Z.3
Cam, H.4
Challa, N.5
-
8
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Diffie and M. Hellman, "New directions in cryptography, " IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory, Vol. IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
9
-
-
84970042709
-
-
( Jul.)
-
(2013, Jul.). Digital signature standard (DSS). FIPS PUB 186-4 [Online]. Available: http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
-
(2013)
Digital Signature Standard (DSS). FIPS PUB
, pp. 186-194
-
-
-
10
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
Jul
-
T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms, " IEEE Trans. Inf. Theory, vol. IT-31, no. 4, pp. 469-472, Jul. 1985.
-
(1985)
IEEE Trans. Inf. Theory, Vol. IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
11
-
-
84892621763
-
A novel and lightweight system to secure wireless medical sensor networks
-
Jan
-
D. He, S. Chan, and S. Tang, "A novel and lightweight system to secure wireless medical sensor networks, " IEEE J. Biomed. Health Informat., vol. 18, no. 1, pp. 316-326, Jan. 2014.
-
(2014)
IEEE J. Biomed. Health Informat.
, vol.18
, Issue.1
, pp. 316-326
-
-
He, D.1
Chan, S.2
Tang, S.3
-
12
-
-
36348970576
-
Privacy-preserving telecardiology sensor networks: Toward a low-cost portable wireless hardware/software codesign
-
Nov
-
F. Hu, M. Jiang, M. Wagner, and D. C. Dong, "Privacy-preserving telecardiology sensor networks: Toward a low-cost portable wireless hardware/software codesign, " IEEE Trans. Inf. Tech. Biomed., vol. 11, no. 6, pp. 619-627, Nov. 2007.
-
(2007)
IEEE Trans. Inf. Tech. Biomed.
, vol.11
, Issue.6
, pp. 619-627
-
-
Hu, F.1
Jiang, M.2
Wagner, M.3
Dong, D.C.4
-
13
-
-
67349219359
-
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
-
May
-
Y. M. Huang, M. Y. Hsieh, H. C. Hung, and J. H. Park, "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks, " IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 400-411, May 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.4
, pp. 400-411
-
-
Huang, Y.M.1
Hsieh, M.Y.2
Hung, H.C.3
Park, J.H.4
-
14
-
-
77956373900
-
MEDiSN: Medical emergency detection in sensor networks
-
J. Ko, J. H. Lim, Y. Chen, R. Musaloiu-E., A. Terzis, and G. M. Mas-son, "MEDiSN: Medical emergency detection in sensor networks, " ACM Trans. Embedded Comput. Syst., vol. 10, pp. 1-29, 2010.
-
(2010)
ACM Trans. Embedded Comput. Syst.
, vol.10
, pp. 1-29
-
-
Ko, J.1
Lim, J.H.2
Chen, Y.3
Musaloiu, E.R.4
Terzis, A.5
Mas-Son, G.M.6
-
15
-
-
77958543058
-
Secure health monitoring using medical wireless sensor networks
-
Seoul, Korea, Aug. 16-18
-
P. Kumar, Y. D. Lee, and H. J. Lee, "Secure health monitoring using medical wireless sensor networks, " in Proc. 6th Int. Conf. Netw. Comput. Adv. Inf. Manage., Seoul, Korea, Aug. 16-18, 2010, pp. 491-494.
-
(2010)
Proc. 6th Int. Conf. Netw. Comput. Adv. Inf. Manage
, pp. 491-494
-
-
Kumar, P.1
Lee, Y.D.2
Lee, H.J.3
-
16
-
-
84863011893
-
Security issues in healthcare applications using wireless medical sensor networks: A survey
-
P. Kumar and H. J. Lee, "Security issues in healthcare applications using wireless medical sensor networks: A survey, " Sensors, vol. 12, pp. 55-91, 2012.
-
(2012)
Sensors
, vol.12
, pp. 55-91
-
-
Kumar, P.1
Lee, H.J.2
-
17
-
-
79953065589
-
An efficient mutual authentication and access control scheme for wireless sensor network in healthcare
-
X. H. Le, M. Khalid, R. Sankar, and S. Lee, "An efficient mutual authentication and access control scheme for wireless sensor network in healthcare, " J. Netw., vol. 27, pp. 355-364, 2011.
-
(2011)
J. Netw.
, vol.27
, pp. 355-364
-
-
Le, X.H.1
Khalid, M.2
Sankar, R.3
Lee, S.4
-
18
-
-
49049084841
-
A new stream cipher for ubiquitous application
-
Gyeongju, South Korea
-
H. J. Lee and K. Chen, "A new stream cipher for ubiquitous application, " in Proc. Int. Conf. Convergence Inf. Technol., Gyeongju, South Korea, 2007, pp. 1893-1899.
-
(2007)
Proc. Int. Conf. Convergence Inf. Technol
, pp. 1893-1899
-
-
Lee, H.J.1
Chen, K.2
-
19
-
-
67349253018
-
SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth system
-
May
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth system, " IEEE J. Sel. Area Commun., vol. 27, no. 4, pp. 365-378, May 2009.
-
(2009)
IEEE J. Sel. Area Commun.
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
20
-
-
20544447851
-
CodeBlue: An Ad-Hoc sensor network infrastructure for emergency medical care
-
Boston, MA, USA, Jun. 6-9
-
D. Malan, T. F. Jones, M. Welsh, and S. Moulton, "CodeBlue: An Ad-Hoc sensor network infrastructure for emergency medical care, " in Proc. MobiSys Workshop Appl. Mobile Embedded Syst., Boston, MA, USA, Jun. 6-9, 2004, pp. 12-14.
-
(2004)
Proc. MobiSys Workshop Appl. Mobile Embedded Syst
, pp. 12-14
-
-
Malan, D.1
Jones, T.F.2
Welsh, M.3
Moulton, S.4
-
21
-
-
70349646298
-
Design and implementation of secure wireless mote-based medical sensor network
-
K. Malasri and L. Wang, "Design and implementation of secure wireless mote-based medical sensor network, " Sensors, vol. 9, pp. 6273-6297, 2009.
-
(2009)
Sensors
, vol.9
, pp. 6273-6297
-
-
Malasri, K.1
Wang, L.2
-
22
-
-
80055091218
-
Enforcing patient privacy in healthcare WSNS through key distribution algorithms
-
J. Misic and V. Misic, "Enforcing patient privacy in healthcare WSNS through key distribution algorithms, " Secur. Commun. Netw., vol. 1, pp. 417-429, 2008.
-
(2008)
Secur. Commun. Netw.
, vol.1
, pp. 417-429
-
-
Misic, J.1
Misic, V.2
-
23
-
-
19944375078
-
Lifeguard-A personal physiological monitor for extreme environments
-
San Francisco, CA, USA, Sep. 1-5
-
K. Montgomery, C. Mundt, G. Thonier, A. Tellier, U. Udoh, V. Barker, R. Ricks, L. Giovangrandi, P. Davies, Y. Cagle, J. Swain, J. Hines, and G. Kovacs, "Lifeguard-A personal physiological monitor for extreme environments, " in Proc. 26th Annu. Int. Conf. IEEE EMBS, San Francisco, CA, USA, Sep. 1-5, 2004, pp. 2192-2195.
-
(2004)
Proc. 26th Annu. Int. Conf. IEEE EMBS
, pp. 2192-2195
-
-
Montgomery, K.1
Mundt, C.2
Thonier, G.3
Tellier, A.4
Udoh, U.5
Barker, V.6
Ricks, R.7
Giovangrandi, L.8
Davies, P.9
Cagle, Y.10
Swain, J.11
Hines, J.12
Kovacs, G.13
-
24
-
-
77952129575
-
Ubiquitous monitoring environment for wearable and implantable sensors (UbiMon), " (poster)
-
Nottingham, U.K., Sep. 7-14
-
J. Ng, B. Lo, O. Wells, M. Sloman, N. Peters, A. Darzi, C. Touma-zou, and G. Z. Yang, "Ubiquitous monitoring environment for wearable and implantable sensors (UbiMon), " (poster), in Proc. 6th Int. Conf. Ubiquitous Comput., Nottingham, U.K., Sep. 7-14, 2004.
-
(2004)
Proc. 6th Int. Conf. Ubiquitous Comput
-
-
Ng, J.1
Lo, B.2
Wells, O.3
Sloman, M.4
Peters, N.5
Darzi, A.6
Touma-Zou, C.7
Yang, G.Z.8
-
25
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes, " in Proc. 17th Int. Conf. Theory Appl. Cryptograph. Techn., 1999, pp. 223-238.
-
(1999)
Proc. 17th Int. Conf. Theory Appl. Cryptograph. Techn
, pp. 223-238
-
-
Paillier, P.1
-
26
-
-
77951699595
-
BARI+: A biometric based distributed key management approach for wireless body area networks
-
S. Raazi, H. Lee, S. Lee, and Y. K. Lee, "BARI+: A biometric based distributed key management approach for wireless body area networks, " Sensors, vol. 10, pp. 3911-3933, 2010.
-
(2010)
Sensors
, vol.10
, pp. 3911-3933
-
-
Raazi, S.1
Lee, H.2
Lee, S.3
Lee, Y.K.4
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems, " Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
29
-
-
70049107935
-
Design and evaluation of lightweight middleware for personal wireless body area network
-
A. B. Waluyo, I. Pek, X. Chen, and W.-S. Yeoh, "Design and evaluation of lightweight middleware for personal wireless body area network, " Personal Ubiquitous Comput., vol. 13, pp. 509-525, 2009.
-
(2009)
Personal Ubiquitous Comput.
, vol.13
, pp. 509-525
-
-
Waluyo, A.B.1
Pek, I.2
Chen, X.3
Yeoh, W.-S.4
-
30
-
-
45849120977
-
-
Dept. Com-put. Sci., Univ. Virginia: Charlottesville, VA, USA, Tech. Rep. CS-2006-01
-
A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, and J. Stankovic, "ALARM-NET: Wireless sensor networks for assisted-living and residential monitoring, " Dept. Com-put. Sci., Univ. Virginia: Charlottesville, VA, USA, Tech. Rep. CS-2006-01, 2006.
-
(2006)
ALARM-NET: Wireless Sensor Networks for Assisted-living and Residential Monitoring
-
-
Wood, A.1
Virone, G.2
Doan, T.3
Cao, Q.4
Selavo, L.5
Wu, Y.6
Fang, L.7
He, Z.8
Lin, S.9
Stankovic, J.10
-
31
-
-
84893452444
-
Privacy-preserving wireless medical sensor network
-
X. Yi, J. Willemson, and F. Nat-Abdesselam, "Privacy-preserving wireless medical sensor network, " in Proc. 12th IEEE Int. Conf. Trust, Security Privacy Comput. Commun., 2013, pp. 118-125.
-
(2013)
Proc. 12th IEEE Int. Conf. Trust, Security Privacy Comput. Commun
, pp. 118-125
-
-
Yi, X.1
Willemson, J.2
Nat-Abdesselam, F.3
-
32
-
-
84885111766
-
An energy efficient key management scheme for body sensor networks
-
Nov
-
H. Zhao, J. Qin, and J. Hu, "An energy efficient key management scheme for body sensor networks, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 11, pp. 2202-2210, Nov. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.11
, pp. 2202-2210
-
-
Zhao, H.1
Qin, J.2
Hu, J.3
|