共 49 条
[1]
Agrafioti Foteini, 2011, Biometrics, P199
[3]
Towards Using Physiological Signals as Cryptographic Keys in Body Area Networks
[J].
PROCEEDINGS OF THE 2015 9TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING TECHNOLOGIES FOR HEALTHCARE (PERVASIVEHEALTH),
2015,
:92-99
[4]
A security policy model for clinical information systems
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:30-43
[5]
[Anonymous], 2009, P 2009 ICME INT C CO
[6]
[Anonymous], 2006, P BIOM S SPEC SESS R
[7]
[Anonymous], 2001, NIST SPECIAL PUBLICA
[8]
[Anonymous], 2016, MATLAB R2016A
[9]
[Anonymous], Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM), DOI DOI 10.1109/INFOCOM.2008.4544608
[10]
[Anonymous], 2013, Proc. of ACM CCS'13, DOI DOI 10.1145/2508859.2516658